• Client-side encryption is the cryptographic technique of encrypting data on the sender's side, before it is transmitted to a server such as a cloud storage...
    8 KB (649 words) - 08:13, 8 July 2024
  • Thumbnail for Client–server model
    with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server. When a bank...
    26 KB (3,113 words) - 02:36, 1 September 2024
  • file sharing services provide client-side encryption. This type of encryption is not referred to as end-to-end encryption because only one end has the...
    29 KB (3,041 words) - 17:21, 31 July 2024
  • "Tencent Weiyun". 6 December 2016. Retrieved 6 December 2016. "Client-Side Encryption – Explained". TitanFile. 22 January 2014. Retrieved 1 November 2016...
    35 KB (1,315 words) - 01:26, 29 August 2024
  • provided centralized storage that included unlimited capacity, client-side encryption, media streaming, file versioning and backups, and multi-platform...
    20 KB (1,890 words) - 01:53, 4 August 2024
  • Proton Mail (category End-to-end encryption)
    in 2013 headquartered in Plan-les-Ouates, Switzerland. It uses client-side encryption to protect email content and user data before they are sent to Proton...
    51 KB (4,629 words) - 11:54, 14 September 2024
  • Thumbnail for Wuala
    client-side encryption. All files and their metadata – most OS X metadata is not supported – get encrypted before they are uploaded. The encryption key...
    17 KB (1,554 words) - 10:56, 26 June 2024
  • does not include web hosting providers who may offer email server and/or client software as a part of hosting package, or telecommunication providers (mobile...
    74 KB (2,960 words) - 17:51, 19 August 2024
  • Thumbnail for Cryptomator
    Cryptomator is an open source encryption software that provides encryption for cloud drives. It provides transparent, client-side encryption for personal cloud storage...
    6 KB (455 words) - 21:08, 16 August 2024
  • scheme Client-side encryption Confidential computing Searchable symmetric encryption Secure multi-party computation Format-preserving encryption Polymorphic...
    40 KB (4,409 words) - 06:07, 19 August 2024