Companies similar to ALTOCRYPT
Sign up to Download

91-120 of 3,275,184 results

  • www.quantumca.org
We develop post-quantum (or quantum resistant) public key encryption techniques. Our first implementation is based on the Random Linear Code Based Public Key Encryption Shceme (RLCE) which was recently introduced by Dr. Yongge Wang. The full package..

Relevance: 13.634945
  • www.infiniteinspecsllc.com
Infinite Inspections, LLC is dedicated to providing exemplary Quality Assurance, craftsmanship, site safety and sound mechanical aptitude. Our outstanding ability to communicate and collaborate with owners, prime contractors and sub-contractors..

Relevance: 13.607012
  • www.4thprime.com
  • 1
  • 1
  • 2
Based in Boca Raton, FL, 4th Prime is helping clients realize their computing goals efficiently, securely, and on-budget... The mission of 4th Prime is to revolutionize the way computing works for individuals, small businesses, and educational..

Relevance: 13.603345
  • www.totaldevice.com
  • 1
  • 1
  • 3
To secure private and public enterprises against data leakage, Total Device provides a powerful software range that includes protection of all removable storage media, E-mail protection, Mobile Risk Management, Database encryption, Application..

Relevance: 13.601778
  • www.persenc.com
  • 1
  • 1
  • 1
Persenc Software's ShunyaMail is an easy to use secure email... ShunyaMail uses strong encryption to secure email. It supports 4096 bits RSA, 256 bits AES and SHA512 hash... ShunyaMail is encrypted and decrypted on a personal computer providing..

Relevance: 13.57622
  • en.plpump.net
  • 12
  • 6
  • 6
Hebei Prime Pump Technology Co., Ltd.PRIME is a professional manufacturer who develops, manufactures and sells submersible pumps, heatproof submersible pumps..... For a long time, our company has a complete quality assurance system in ensuring..

Relevance: 13.553462
  • www.cultivate.se
  • 1
  • 1
"Companies spend millions of dollars on firewalls, encryption and secure access devices,..

Relevance: 13.530533
  • www.point2pointtech.com
  • 2
Point 2 Point Technology, Inc. is a woman owned corporation that develops custom solutions through the use of technology, business strategies, system design, enterprise architecture, network design and management, secure models, system integration,..

Relevance: 13.511766
  • www.zgffty.com
  • 1
  • 1
Changshu Feifan Metalwork Co.,Ltd (FEIFAN) was established in 2002. Now, FEIFAN is one of largest rolling forged ball manufacturer in the world and is one of the leading manufacturers in the world... Our company has established perfect quality..

Relevance: 13.494751
  • www.germanhighstreet.com
  • 2
  • 1
  • 6
Our focus is prime properties in German cities and the Scandinavia, prioritizing quality and strong tenants on main streets or in prime areas... Learn more about the management and board of German High Street...

Relevance: 13.469758
  • www.moneytradersltd.com
  • 1
  • 1
Money Traders Ltd. provide bespoke and high quality construction, services to private and commercial clients with prime residences... We manage a wide range of projects, ranging from new-build homes, whole house refurbishments and basements to home..

Relevance: 13.467785
  • www.ruolinz.com
online encryption tool is an application which purely runs in your browser and provides features of key generation, text encryption and decryption...

Relevance: 13.464764
  • www.echoworx.com
  • 1
  • 3
Discover Echoworx, the industry-leading provider of cutting-edge email encryption to safeguard your sensitive communications... Don't settle for rigid encryption solutions that limit your communication potential. Echoworx provides eight diverse..

Relevance: 13.45394
  • www.blockchainencryption.net
Block Chain is being embraced by many enterprises including SAP, Deloitte, IBM, UPS, Vanguard, and other organizations to develop product and asset life-cycle management systems. Data-centers are popping up across the country just to manage the Block..

Relevance: 13.45394
  • www.crypteron.com
  • 2
  • 5
In order to be compliant, most organizations either abandon the public cloud or build their own encryption infrastructure which takes a tremendous amount of time, resources, and technical expertise. CipherDB provides the best of both worlds, allowing..

Relevance: 13.432398
  • www.verumqualitasconsultancylimited.com
  • 1
Established in 2016, Verum Qualitas Limited was created by Alfie Grenney, MSc, MCQI, CQP a Chartered Quality Professional with over forty years experience in engineering. The prime objective of Verum Quality Limited is to provide quality assurance..

Relevance: 13.414249
  • sql05upgrade.azurewebsites.net
SQL Server is an important part of your company's cloud strategy. Services like Azure Express Route, Azure StorSimple, Azure Active Directory, and Azure Premium Storage help you get the most out of your high-performance workloads both on-premises and..

Relevance: 13.40609
  • www.turbocrypt.com
  • 1
  • 2
Ciphers.de is a non-profit data security project that specializes in ultimate encryption technology. Standard encryption technology is heavily promoted by a couple of governments and it appears to be obvious that these bodies cannot promote "the real..

Relevance: 13.400786
  • www.primetechnosoft.com
  • 1
  • 1
Prime Technosoft - One stop shop for all kinds of Software Development, SEO and Digital Media Management... We offer automated testing services for existing and new projects and have a dedicated Quality Assurance team... Our team provides round the..

Relevance: 13.398819
  • www.omegakrypto.com
  • 1
  • 1
What we offer is a solution to keep your information private without the need to modify your data structures or increase your computational power... Our development can be considered as an evolution of the Vigenère cipher creating a whole new..

Relevance: 13.390268
  • www.ubiqsecurity.com
  • 5
Ubiq is an application-layer encryption API that enables engineers and information security teams to seamlessly integrate data encryption into any application without needing prior knowledge or expertise in encryption, enabling the application to..

Relevance: 13.390268
  • pc-encrypt.com
  • 1
PC-Encrypt Inc. provides exceptionally strong and robust, encryption software for E-mail, Files/Folders, and E-Documents. Our software works on ALL Windows, and ALL E-mail. In the time it takes you to read this information, you can download/install..

Relevance: 13.35416
  • primehealthnp.ca
  • 1
  • 2
  • 1
Prime Health was created to focus on health and wellness of the community. Health promotion and health prevention means having control over one's health and in turn, improving it and preventing diseases. Our goal is being well or becoming well. We..

Relevance: 13.326776
  • www.dataroom-uk.co.uk
  • 2
We provide a document repository where various parties have secure access to sensitive documents - anytime, anywhere. We offer top of the line security 128-256-bit (SSL) encryption for your files during transfer and industry standard 256-bit AES..

Relevance: 13.325743
  • store.foocrypt.xyz
  • 2
If you continue to use this site we will assume that you accept the use of cookies on our website... FooCrypt, A Tale Of Cynical Cyclical Encryption Provides you with the total peace of mind over the SECURITY and PRIVACY of YOUR DATA via..

Relevance: 13.321904
  • store.foocrypt.xyz
  • 2
FooCrypt, A Tale Of Cynical Cyclical Encryption Provides you with the total peace of mind over the SECURITY and PRIVACY of YOUR DATA via Cryptography and Steganography... FooCrypt, A Tale Of Cynical Cyclical Encryption... If you continue to use this..

Relevance: 13.321904
  • www.idooencryption.com
  • 3
idoo Software, which was established in 2009 while software development was one of the most dynamic industries , is the leading provider and developer of consumer digital media tools. We're always focusing on developing exceptionally useful and easy..

Relevance: 13.305358
  • dataroomsoft.net
Data encryption scrambles information so that it can only be read by authorized parties. It's an essential tool for eliminating the risk of sensitive information breaches by criminals and hackers. Hackers can bypass some encryption methods, but it's..

Relevance: 13.281515
  • www.uclhapp.com
  • 1
The UCLHapp is DPA compliant, providing technical safeguards, such as encryption, access control and hardware encryption engine to efficiently protect healthcare information, without affecting performance...

Relevance: 13.267967
  • vdrservice.net
At the physical level, infrastructure security includes protection of hardware such as firewalls and servers. At the network level, security involves traffic encryption, and use of authentication and authorization systems. At the application level,..

Relevance: 13.252856