TPVS - A company you can trust
Description
excerpt from site's contentA company you can trust Tamper-Proof Verified Systems We have invented the mathematics and now are implementing applications of the revolutionary universal program encryption UPE technology It provides full control over your programs and data without hardware keys Modular product design user-specific solutions It is s...
This is an automatically generated AboutUs page for Tpvs.hu. Click the "Edit" button at the top of the page to make changes. Please read our Getting Started page if you need any help.
[[Category:investmentpossibility]][[Category:Subscriber Identification Module]][[Category:Digital Rights Management]][[Category:secure mobile agents]][[Category:computing by encrypted functions]]
Categories:
- AboutUs AutoGen
- encryption
- privacy
- anti software piracy
- UPE
- universal program encryption
- BarbedWare
- barbedware
- secure key hiding
- SKH
- software protection
- unbreakable encryption
- encryption technology
- virus
- worm
- secure backdoor
- wiretapping
- computer security
- viral marketing
- ideavirus
- invest
- cracking contest
- job
- e-money
- e-buck
- e-dollar
- e-gold
- electronic money
- financial cryptography
- cryptology
- cryptography
- crypto
- cypherpunk
- law enforcement
- cryptanalysis
- cleptography
- key escrow
- GAK
- coderpunks
- Alice and Bob
- crypto protocol
- bit commitment
- PK
- public key
- private key
- secure key manegement
- flexible key management
- digital signatures
- virtual private networks
- VPN
- public key cryptography
- DES
- triple DES
- Blowfish
- Rijndael
- AES
- RSA
- A5
- GSM
- SIM
- protecting privacy
- intrusion of privacy
- DRM
- secure DRM solutions
- SMDI
- Secure Digital Music Initiative
- secure mobile code
- secure mobile agents
- security architecture
- survivable systems
- survivable code
- survivable agents
- survivable software
- tamper resistant software
- TRS
- tamper resistant hardware
- oblivious software
- oblivious hardware
- tamper proof software
- tamper proof hardware
- obfuscated code
- obfuscated software
- code obfuscation
- secure key checking
- obfuscated hardware
- smart cards
- write your code
- information warfare
- computer espionage
- computer forensic
- open source
- zero-knowledge proof systems
- ZKPS
- ZKS
- zero-knowledge
- zero-knowledge proof system
- proof system
- trust management
- instance hiding zero-knowledge proof system
- IHZKPS
- IHZK
- anonymous remailers
- remailers
- mixmaster remailers
- BooleC
- BooleJ
- BooleJava
- James Bond Ware
- digital mixes
- disappearing key
- black-box security
- mobile cryptography
- network survivability
- reverse engineering
- dynamic analysis
- static analysis
- trusted software on untrustworthy hosts
- trusted software on unreliable hardware
- reliable system design
- mobile agent security
- information survivability
- critical infrastructure protection
- proof-carrying code
- computer-related risks assesment
- secure data retrieval
- blinded search
- blinded data retrieval
- attack detection
- malicious code
- protecting source code
- survivability architectures
- anonymous network
- code safety
- security of mobile code systems
- obfuscating Java code
- obfuscating C code
- P=?NP
- P vs NP
- P=NP
- algorithmic complexity
- computational complexity
- abuse-resilient systems
- obfuscator
- obfuscation
- pseudo-random generator
- virtual black-box
- oracle computation
- hardware obfuscation
- abuse resilient softvare
- white-noise computation
- circuit indistinguishibility
- pseudorandom function
- unobfuscatable
- software watermarking
- approximate obfuscator
- copy protection
- homomorphic encryption
- circuit obfuscator
- obfuscated signature
- obfuscated public-key encryption
- protecting against reverse engineering
- message authentication
- obfuscated message authentication scheme
- secure signatures
- efficient virus protection
- survivability management
- preventing intelligent tampering
- preventing impersonation
- preventing man-in-the-middle attack
- verification
- intrusion detection
- MAC
- manipulation detection code
- message digest
- compression function
- contraction function
- collision free
- cryptographic checksum
- hash function
- MIC
- message integrity check
- one-way hash function
- trapdoor one-way function
- PRNG
- pseudo-random number generator