http://206.189.178.169:3001/?freshness=All&show=1&q=Pgp-Encryption-Example+INR+loc%3Ain Pgp Encryption Example - Discover Fashion Products | Styleberry

Pgp Encryption Example

120 results discovered for Pgp Encryption Example. Refine by style, occasion, or category to find more relevant fashion products.

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Pgp-Encryption-Example","processingTimeMs":0,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Pgp-Encryption-Example
                    [processingTimeMs] => 0
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Pgp-Encryption-Example+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"pgp-encryption-example inr loc:in","totalEstimatedMatches":171,"nextOffset":120,"currentOffset":0,"value":{"D39E581D5C17F00001E8387E1398917A3423113F":{"name":"Session-key based encryption. In the modern world, security is the ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.BitPCQ9AOazpbWyg4IvuQwHaDY?pid=Api","datePublished":"2022-08-23T21:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/1*YNNHK2av8SqX6mjx_A8_Wg.png","hostPageUrl":"https://tech.groww.in/session-key-based-encryption-2c223476c3d4","contentSize":"322185 B","width":1358,"height":620,"cDNContentUrl":"https://th.bing.com/th/id/R.062b4f090f4039ace96d6ca0e08bee43?rik=PemF0cVxDwAQjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F3113243A7198931E7838E10000F71C5D185E93D","accentColor":"C67905"},"5A8353844BBF1EC732263A2F56D313CAEDB4C5C6":{"name":"Fig : PGP encryption","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.vuLlpBefirYPhFciN5quzQAAAA?pid=Api","datePublished":"2022-07-15T02:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://bcognizance.iiita.ac.in/archive/Oct-Dec09/esecure1_clip_image001.gif","hostPageUrl":"https://bcognizance.iiita.ac.in/archive/Oct-Dec09/esecure1.html","contentSize":"8425 B","width":427,"height":200,"cDNContentUrl":"https://th.bing.com/th/id/R.bee2e5a4179f8ab60f845722379aaecd?rik=pTg1SLT74XwjYg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6C5C4BDEAC313D65F2A362237CE1FBB4483538A5","accentColor":"2D2D2D"},"E84C0C7CDD993C2A2939ED005B13314695B2B74C":{"name":"What is Packet Sniffing? What are the ways to Protect against Sniffing?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.-s_t3WOR0vzKbnpprewjkQHaEK?pid=Api","datePublished":"2021-11-17T23:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://in.norton.com/content/dam/blogs/images/norton/am/plaintext_privacy.png","hostPageUrl":"https://in.norton.com/blog/privacy/what-is-packet-sniffing-and-ways-to-protect-against-sniffing","contentSize":"53361 B","width":982,"height":552,"cDNContentUrl":"https://th.bing.com/th/id/R.facfeddd6391d2fcca6e7a69adec2391?rik=jsTAx92Zw6KSkw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C47B2B59641331B500DE9392A2C399DDC7C0C48E","accentColor":"82452F"},"AFEF2FF1D439894AC1F8393F2BD361F9D4DD4632":{"name":"Fully Homomorphic Encryption with Optimal Key Generation Secure Group ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8-MDspuE0jR3IE-vlAHUTwHaGC?pid=Api","datePublished":"2023-05-15T07:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-13-06055/article_deploy/html/images/applsci-13-06055-g001-550.jpg","hostPageUrl":"https://www.mdpi.com/2076-3417/13/10/6055","contentSize":"98201 B","width":550,"height":448,"cDNContentUrl":"https://th.bing.com/th/id/R.f3e303b29b84d23477204faf9401d44f?rik=%2bv7yH02TmKQcjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2364DD4D9F163DB2F3938F1CA498934D1FF2FEFA","accentColor":"C86603"},"0FDB299B54F733C8C6274FD4A1A0771556D5628C":{"name":"Cryptography : Types of Cryptosystem - Ankit","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.G2FYy6-zHrSzAidg-UmlRAHaF3?pid=Api","datePublished":"2017-02-22T06:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ankitjain.info/articles/Cryptography_ankit_files/image006.jpg","hostPageUrl":"https://ankitjain.info/articles/Cryptography_ankit4.htm","contentSize":"26310 B","width":503,"height":399,"cDNContentUrl":"https://th.bing.com/th/id/R.1b6158cbafb31eb4b3022760f949a544?rik=8L2SuUV%2fM4xscg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C8265D6551770A1A4DF4726C8C337F45B992BDF0","accentColor":"CA01C9"},"45D9E2E9AB67C56DBB2B1AE09823D5AB278218FE":{"name":"How to Decrypt PGP Encrypted files in Databricks – Ization","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.vC9OMEm4ezHdsitzp8IqWQHaDU?pid=Api","datePublished":"2021-10-29T02:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ization.in/wp-content/uploads/2021/10/decrypting-pgp-encrypted-files-in-databricks.jpg","hostPageUrl":"https://ization.in/2021/10/18/how-to-decrypt-pgp-encrypted-files-in-databricks/","contentSize":"161394 B","width":1833,"height":823,"cDNContentUrl":"https://th.bing.com/th/id/R.bc2f4e3049b87b31ddb22b73a7c22a59?rik=VJ0unrp2XNa7sg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EF812872BA5D32890EA1B2BBD65C76BA9E2E9D54","accentColor":"32996D"},"9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D":{"name":"Зачем нужны криптовалютные кошельки? — Teletype","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api","datePublished":"2023-04-07T15:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png","hostPageUrl":"https://teletype.in/@cryptoscamm/wallet_basic","contentSize":"22502 B","width":624,"height":334,"cDNContentUrl":"https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9","accentColor":"BB3810"},"9698159D382975390B87437A6F8217527DFA5882":{"name":"Encryption & Decryption : Information Security ~ I. T. Engg Portal","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.W6dG7juQ6sk3iVsEdY8P-wHaFN?pid=Api","datePublished":"2012-02-02T03:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://4.bp.blogspot.com/--6K9yaChFG0/Tu99le284cI/AAAAAAAAAwA/PLTQAivk0fs/s1600/encryption_decryption.gif","hostPageUrl":"http://www.itportal.in/2011/12/encryption-decryption-information.html","contentSize":"29453 B","width":491,"height":345,"cDNContentUrl":"https://th.bing.com/th/id/R.5ba746ee3b90eac937895b04758f0ffb?rik=aYlR2YOSV5OweA&riu=http%3a%2f%2f4.bp.blogspot.com%2f--6K9yaChFG0%2fTu99le284cI%2fAAAAAAAAAwA%2fPLTQAivk0fs%2fs1600%2fencryption_decryption.gif&ehk=0S5OgSUwWUXFque4LWhii1naq2un37u3rcD78v3TcG4%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2885AFD7257128F6A73478B093579283D9518969","accentColor":"018ECA"},"966CF46BFEAFAA88EE25E46F3AAA432A8677C7D5":{"name":"What is End-to-End Encryption: E2EE Explained For Beginners | nasscom ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.hpxpaYtzTgGCBuPAHQmqogHaE9?pid=Api","datePublished":"2023-06-23T10:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.zeeve.io/wp-content/uploads/2023/06/End-to-end-encryption-01-1-1024x685.jpg","hostPageUrl":"https://community.nasscom.in/communities/blockchain/what-end-end-encryption-e2ee-explained-beginners","contentSize":"58822 B","width":1024,"height":685,"cDNContentUrl":"https://th.bing.com/th/id/R.869c69698b734e018206e3c01d09aaa2?rik=acZPtu%2f6qojuUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D7C7768A234AAA3F64E52EE88AAFAEFB64FC669","accentColor":"034C65"},"F871B2F50DEFF8B324ACCC1CE6D1DF827FC67B9A":{"name":"The Basics of Keeping Kubernetes Clusters Secure | Trend Micro (IN)","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.W-KVsA3oxObr3Jc9xZ637QAAAA?pid=Api","datePublished":"2020-08-28T17:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://documents.trendmicro.com/images/TEx/articles/an-example-of-an-EncryptionConfiguration.jpg","hostPageUrl":"https://www.trendmicro.com/vinfo/in/security/news/virtualization-and-cloud/the-basics-of-keeping-your-kubernetes-cluster-secure-part-1","contentSize":"37226 B","width":400,"height":265,"cDNContentUrl":"https://th.bing.com/th/id/R.5be295b00de8c4e6ebdc973dc59eb7ed?rik=jxcrX9D%2bjztCyg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A9B76CF728FD1D6EC1CCCA423B8FFED05F2B178F","accentColor":"8608C3"},"C0BCF1E5DC7B049ECB9A161905A78E21C1B1F937":{"name":"RSA encryption/decryption C# example","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.i8jjZaIGiEFkQZ-RLQNsdAHaDs?pid=Api","datePublished":"2021-11-03T06:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-ZF5KddnDgBA/YPPzQJxLskI/AAAAAAAAPgM/A8rgwEIpzmQfBGE3jY4KxYF-IqPYxwQVgCLcBGAsYHQ/w1600/rsa.png","hostPageUrl":"https://www.codeguru.co.in/2021/11/rsa-encryptiondecryption-c-example.html","contentSize":"27659 B","width":804,"height":401,"cDNContentUrl":"https://th.bing.com/th/id/R.8bc8e365a206884164419f912d036c74?rik=DMsfXs23QOm8qQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"739F1B1C12E87A509161A9BCE940B7CD5E1FCB0C","accentColor":"4C3299"},"BC417D4F228767ECCEBBF252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.GSWvApnoTbuiWqOeHaC5HwAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/7.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"45108 B","width":450,"height":383,"cDNContentUrl":"https://th.bing.com/th/id/R.1925af0299e84dbba25aa39e1da0b91f?rik=yxTX9CJ4ds7suw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252FBBECCE767822F4D714CB","accentColor":"A62725"},"612B1C184A635A53D4D19DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"67377 B","width":664,"height":408,"cDNContentUrl":"https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"0B48AD5DEEC77AD47FD91D4D35A536A481C1B216","accentColor":"BE550D"},"93C38CAB4366807FCF8BF252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ka5o843pFimq-bFOD1QpJwAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/15.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"37892 B","width":350,"height":314,"cDNContentUrl":"https://th.bing.com/th/id/R.91ae68f38de91629aaf9b14e0f542927?rik=OTzIujRmCPf8uA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252FB8FCF7086634BAC83C39","accentColor":"A3282C"},"DED2F32CA13F921F995D42E874BC3610869A32AE":{"name":"A Novel Secure End-to-End IoT Communication Scheme Using Lightweight ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Ctxz9LR23pIGm_2CdbtY4QHaEI?pid=Api","datePublished":"2022-09-01T15:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/applsci/applsci-12-08817/article_deploy/html/images/applsci-12-08817-g002.png?1662348680","hostPageUrl":"https://www.mdpi.com/2076-3417/12/17/8817","contentSize":"438575 B","width":3230,"height":1805,"cDNContentUrl":"https://th.bing.com/th/id/R.0adc73f4b476de92069bfd8275bb58e1?rik=7S0%2fwhrzKfGZ1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EA23A9680163CB478E24D599F129F31AC23F2DED","accentColor":"01B04E"},"282519FB2C5655084A95DBDBDF38F99B95CCC5C0":{"name":"Azure Data Lake Storage Gen2 connection | Adobe Experience Platform","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.cF_uhbHjwZ5VJvL13VPIkQHaCZ?pid=Api","datePublished":"2022-11-01T22:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://experienceleague.adobe.com/en/docs/experience-platform/destinations/catalog/cloud-storage/media_13802737cf6dc040fef83a394b10041086cc4e682.png?width=750&format=png&optimize=medium","hostPageUrl":"https://experienceleague.adobe.com/en/docs/experience-platform/destinations/catalog/cloud-storage/adls-gen2","contentSize":"13148 B","width":555,"height":180,"cDNContentUrl":"https://th.bing.com/th/id/R.705fee85b1e3c19e5526f2f5dd53c891?rik=glKRv8JlVYCkWQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0C5CCC59B99F83FDBDBD59A4805565C2BF915282","accentColor":"C1120A"},"75C88C4E3016BDE91F39EA5BD63D893CC6B6A930":{"name":"Beginner Guide of Cryptography (Part 1)","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.95yyxykmqzDYdZqt89OB7AHaGE?pid=Api","datePublished":"2016-07-20T21:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-LTmpkMhwZ8U/V4-yAUdVjuI/AAAAAAAAM4w/IQKelhgOYgAKeM_oimrOd2hG5yGLxbQOACLcB/s1600/10.png","hostPageUrl":"https://www.hackingarticles.in/beginner-guide-cryptography-part-1/","contentSize":"78784 B","width":891,"height":730,"cDNContentUrl":"https://th.bing.com/th/id/R.f79cb2c72926ab30d8759aadf3d381ec?rik=V4zI5ANh257xkw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"039A6B6CC398D36DB5AE93F19EDB6103E4C88C57","accentColor":"A26A0C"},"1B42E457DC180FA1125C7EAB9355205C6648AC5B":{"name":"Cryptography : Types of Cryptosystem - Ankit","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP._29P1EesqgUqZo4d9ryiUwHaE9?pid=Api","datePublished":"2010-07-25T09:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.ankitjain.info/articles/Cryptography_ankit_files/image004.jpg","hostPageUrl":"http://www.ankitjain.info/articles/Cryptography_ankit4.htm","contentSize":"19535 B","width":506,"height":339,"cDNContentUrl":"https://th.bing.com/th/id/R.ff6f4fd447acaa052a668e1df6bca253?rik=sSROdc2B8BohxQ&riu=http%3a%2f%2fwww.ankitjain.info%2farticles%2fCryptography_ankit_files%2fimage004.jpg&ehk=abqYM5kZYGrLhBjYOXw5WXzSukDHnsdUrFxtS6CzVow%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B5CA8466C5025539BAE7C5211AF081CD754E24B1","accentColor":"C30808"},"20816F1EAA8AB4EA32BD437A6F8217527DFA5882":{"name":"Encryption & Decryption : Information Security ~ I. T. Engg Portal","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.n2uuMW6WBS80vAfv-VJZ_QAAAA?pid=Api","datePublished":"2012-02-02T03:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://docs.oracle.com/cd/E19575-01/820-2765/images/scrypt.gif","hostPageUrl":"http://www.itportal.in/2011/12/encryption-decryption-information.html","contentSize":"10931 B","width":344,"height":131,"cDNContentUrl":"https://th.bing.com/th/id/R.9f6bae316e96052f34bc07eff95259fd?rik=Ahj24aqoS64j2w&riu=http%3a%2f%2fdocs.oracle.com%2fcd%2fE19575-01%2f820-2765%2fimages%2fscrypt.gif&ehk=USTd%2fmiVTh00riQrOlVjNP5HPHlItdRo9nKajxVsCnQ%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2885AFD7257128F6A734DB23AE4BA8AAE1F61802","accentColor":"436A88"},"3BF68392C1F6D81572DDF252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uPb9Xowr12MDbZ5EH0ELGAAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/10.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"44313 B","width":400,"height":330,"cDNContentUrl":"https://th.bing.com/th/id/R.b8f6fd5e8c2bd763036d9e441f410b18?rik=s284KRxvjVEn3Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252FDD27518D6F1C29386FB3","accentColor":"C60705"},"8B23C0E53746945DCB2A8B5A3B36A87D7D1FC071":{"name":"Quantum Time Bomb: When Encryption Stops Working","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.WO-3aYZCYPMEsVbpnLKEywHaDe?pid=Api","datePublished":"2025-06-08T23:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.securew2.com/wp-content/uploads/2024/01/RSA-Encryption-Works.png","hostPageUrl":"https://blog.acmvit.in/quantum-timebomb","contentSize":"25372 B","width":812,"height":381,"cDNContentUrl":"https://th.bing.com/th/id/R.58efb769864260f304b156e99cb284cb?rik=uDIMXnNkSdW8og&pid=ImgRaw&r=0","isTransparent":false,"imageId":"170CF1D7D78A63B3A5B8A2BCD54964735E0C32B8","accentColor":"BE850D"},"D4AD87A75C08A0CA5A89F252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.TKJ7ze-8nb6YMZoVKibNJwAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/4.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"18827 B","width":400,"height":188,"cDNContentUrl":"https://th.bing.com/th/id/R.4ca27bcdefbc9dbe98319a152a26cd27?rik=Tdp4esWACqylmA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252F98A5AC0A80C57A78DA4D","accentColor":"C7B604"},"57EA617E5CD9F9562D41F252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.gkOduZ4XfCSAto1ezchfgwAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/20.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"17431 B","width":300,"height":208,"cDNContentUrl":"https://th.bing.com/th/id/R.82439db99e177c2480b68d5ecdc85f83?rik=da4W58Wdn2XSFA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252F14D2659F9DC5E716AE75","accentColor":"036DC8"},"947B23F6D3B810D30A5F807CB18CA4D7CA09796F":{"name":"End-to-End Encryption: What it is and Why it is Needed","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.LOu26BMGPovGvpdlpFMPrwHaDt?pid=Api","datePublished":"2019-09-15T21:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.etesync.com/content/images/2019/09/without-e2e-1.png","hostPageUrl":"https://blog.etesync.com/end-to-end-encryption-what-it-is-and-why-it-is-needed/","contentSize":"138601 B","width":1024,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.2cebb6e813063e8bc6be9765a4530faf?rik=Sbcybz2LAT2g9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F69790AC7D4AC81BC708F5A03D018B3D6F32B749","accentColor":"CA9901"},"0E8096DB9B1A1D7E8B18F802D02F739049A20F1A":{"name":"Pixrron - Food and Drinks","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.F4bAnNtUPWfxVxsC_I60fAHaDv?pid=Api","datePublished":"2020-06-05T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-OAKVPFtMGWU/Xp56zWF5MRI/AAAAAAAADNU/RGyR5jBOVD4GryZat1T77_-6InPftvb6wCLcBGAsYHQ/s1600/IMPORTANCE%2BOF%2BDATA%2BENCRYPTION.png","hostPageUrl":"https://www.pixrron.in/2020/03/what-is-data-encryption-encryption.html","contentSize":"149838 B","width":1600,"height":809,"cDNContentUrl":"https://th.bing.com/th/id/R.1786c09cdb543d67f1571b02fc8eb47c?rik=4Ahpvbmh0ee4gQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"A1F02A940937F20D208F81B8E7D1A1B9BD6908E0","accentColor":"019E86"},"770C287851BC603CE42013B75F9F6A1E34D14FAE":{"name":"AES encryption for Radio remote Controls","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP._eUzBCMY1eyLCqesAT1dfgHaDv?pid=Api","datePublished":"2020-07-21T04:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.anandcontrol.in/dist/assets/img/radio/aes_encryption.jpg","hostPageUrl":"https://www.anandcontrol.in/blog/aes_encryption_radio_remote_controls.html","contentSize":"55128 B","width":1600,"height":809,"cDNContentUrl":"https://th.bing.com/th/id/R.fde533042318d5ec8b0aa7ac013d5d7e?rik=d8CChxXLBsNOAg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EAF41D43E1A6F9F57B31024EC306CB158782C077","accentColor":"0A7EC1"},"B542281526BB36CFD9C9C129205B2728E82FD060":{"name":"PGP NS - UNIT 3 Pretty Good Privacy (PGP) Definition of PGP Encryption ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wMJ7JZj8RDozXXaueec6kAHaJl?pid=Api","datePublished":"2024-03-06T09:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/89f1a586b5f527027469823e9e4ef551/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/gandhigram-rural-university/introduction-to-computer/pgp-ns/84782280","contentSize":"279936 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.c0c27b2598fc443a335d76ae79e73a90?rik=WySCUWK7Y%2fydnA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"060DF28E8272B502921C9C9DFC63BB625182245B","accentColor":"474747"},"7C98889EDE98F8A0E7DFF252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.T-Ez61yuc7qZpZBY7334HAAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/1.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"39987 B","width":450,"height":427,"cDNContentUrl":"https://th.bing.com/th/id/R.4fe133eb5cae73ba99a59058ef7df81c?rik=x4mI6e2Jjwp%2b%2fQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252FFD7E0A8F89EDE98889C7","accentColor":"1981B2"},"41E8E7A224D805596F60F252BC9C3972F176291A":{"name":"Configuring encryption Jabber + PGP","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.mgVQvULlVzct85I6t7_AEwAAAA?pid=Api","datePublished":"2022-04-05T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pkey.in/articles/imgs/1/5.gif","hostPageUrl":"https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber","contentSize":"21245 B","width":400,"height":186,"cDNContentUrl":"https://th.bing.com/th/id/R.9a0550bd42e557372df3923ab7bfc013?rik=FI5%2bKkKNUJX2Bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A192671F2793C9CB252F06F695508D422A7E8E14","accentColor":"C6B605"},"03FAFBC712AC32D59A7411D6BDE3DAEFB4B5EE36":{"name":"Essential Guide to Symmetric and Asymmetric Encryption in Cryptography","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.B4Cqb2ehpgV3Q1l4EQQ4NQHaDt?pid=Api","datePublished":"2023-09-26T09:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fita.in/wp-content/uploads/2023/09/Symmetric-vs-Asymmetric-Encryption.jpg","hostPageUrl":"https://www.fita.in/essential-guide-to-symmetric-and-asymmetric-encryption-in-cryptography/","contentSize":"115198 B","width":800,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.0780aa6f67a1a6057743597811043835?rik=MK%2b%2ffCHKI12pRw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"63EE5B4BFEAD3EDB6D1147A95D23CA217CBFAF30","accentColor":"0084A9"},"6C035BF1CDAB85BBAC94004A0B60FA752753E84F":{"name":"Explain PGP trust model - PGP (Pretty Good Privacy) is a popular ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ISOMmEpnTyW8LE5xO9966AAAAA?pid=Api","datePublished":"2023-03-02T02:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/bd62b45ec1e23bf334bf76f8d9f945dd/thumb_300_388.png","hostPageUrl":"https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/explain-pgp-trust-model/48730209","contentSize":"56086 B","width":300,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.21238c984a674f25bc2c4e713bdf7ae8?rik=xjC1H9y6WLvKSQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F48E357257AF06B0A40049CABB58BADC1FB530C6","accentColor":"41424D"},"05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0":{"name":"Top 8 Strongest Data Encryption Algorithms in Cryptography","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.AYExbxM6cMs5u-WX3SOyMAHaED?pid=Api","datePublished":"2020-01-21T10:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png","hostPageUrl":"https://acodez.in/data-encryption-algorithms/","contentSize":"42338 B","width":796,"height":435,"cDNContentUrl":"https://th.bing.com/th/id/R.0181316f133a70cb39bbe597dd23b230?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50","accentColor":"264D7F"},"95D27CDDC594E2132E858028DBB5CA41E7855C5B":{"name":"Email Encryption - Competendo - Digital Toolbox","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QdbNRgxwYxuWBylq6jclrAHaF_?pid=Api","datePublished":"2019-08-02T07:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://competendo.net/en/images/thumb/b/b3/Pgp1.jpg/600px-Pgp1.jpg","hostPageUrl":"https://competendo.net/en/Email_Encryption","contentSize":"16465 B","width":600,"height":485,"cDNContentUrl":"https://th.bing.com/th/id/R.41d6cd460c70631b9607296aea3725ac?rik=WS3H3VxJLjHiWA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B5C5587E14AC5BBD820858E2312E495CDDC72D59","accentColor":"30929B"},"1AC2D95386F277D0DB128028DBB5CA41E7855C5B":{"name":"Email Encryption - Competendo - Digital Toolbox","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.h-gQ4U7fTyIr2V1LZCkjRAHaF1?pid=Api","datePublished":"2019-08-02T07:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://competendo.net/en/images/thumb/b/b8/Pgp2.jpg/800px-Pgp2.jpg","hostPageUrl":"https://competendo.net/en/Email_Encryption","contentSize":"19228 B","width":800,"height":631,"cDNContentUrl":"https://th.bing.com/th/id/R.87e810e14edf4f222bd95d4b64292344?rik=oSydNWgvdw29IQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B5C5587E14AC5BBD820821BD0D772F68359D2CA1","accentColor":"30909B"},"86D61A425183E7F44C7EE45F50830A9AA712398C":{"name":"SSH Tutorial: What is SSH, Encryptions and Ports","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.RNTZNhz5kNlQVMZKxyU57wHaEm?pid=Api","datePublished":"2017-07-04T04:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2017/07/asymmetric-encryption.jpg","hostPageUrl":"https://www.hostinger.in/tutorials/ssh-tutorial-how-does-ssh-work","contentSize":"39122 B","width":900,"height":560,"cDNContentUrl":"https://th.bing.com/th/id/R.44d4d9361cf990d95054c64ac72539ef?rik=aG2hJBU4fk%2fE5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C893217AA9A03805F54EE7C44F7E381524A16D68","accentColor":"AB2030"},"8D8CF0C550D2175FD7348028DBB5CA41E7855C5B":{"name":"Email Encryption - Competendo - Digital Toolbox","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.VINbw6iBkwYnDn7SaiNa0QHaCv?pid=Api","datePublished":"2019-08-02T07:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://competendo.net/en/images/thumb/f/f8/Pgp4.jpg/500px-Pgp4.jpg","hostPageUrl":"https://competendo.net/en/Email_Encryption","contentSize":"9824 B","width":500,"height":185,"cDNContentUrl":"https://th.bing.com/th/id/R.54835bc3a8819306270e7ed26a235ad1?rik=2MgPXAUtcfV9Qw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B5C5587E14AC5BBD8208437DF5712D055C0FC8D8","accentColor":"30929B"},"9AA4EC27B80187333B8B290F08E902C1BBEDE8E8":{"name":"Encrypt File | IntelliBuddies® Documentation Portal","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.sn18FlOv-WrmGomwzW9MkwAAAA?pid=Api","datePublished":"2025-03-04T05:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://docs.intellibuddies.com/assets/images/img-encrypt-decrypt-file-example-beec4700bbed1b25cde593c72ef22e52.png","hostPageUrl":"https://docs.intellibuddies.com/docs/activities/encrypt-file/","contentSize":"50390 B","width":407,"height":1124,"cDNContentUrl":"https://th.bing.com/th/id/R.b27d7c1653aff96ae61a89b0cd6f4c93?rik=qUrOcosQeDOzuA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8E8EDEBB1C209E80F092B8B33378108B72CE4AA9","accentColor":"914708"},"97906DBED731EA74CFF6A57EBFBD7C0220CFD19F":{"name":"Symmetric and asymmetric encryptions","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.58doCDbQwNHjd81lv9aJQwHaEK?pid=Api","datePublished":"2023-08-13T14:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.hashnode.com/res/hashnode/image/upload/v1690978571340/e3e0b779-b5e1-48ef-9f62-0062fc14c329.png","hostPageUrl":"https://blog.tdevs.in/symmetric-and-asymmetric-encryption-40a1f1c1530f","contentSize":"98564 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.e7c7680836d0c0d1e377cd65bfd68943?rik=eQnW630Trkf8bw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F91DFC0220C7DBFBE75A6FFC47AE137DEBD60979","accentColor":"101726"},"D44DBD13EF65893D3B3F11D6BDE3DAEFB4B5EE36":{"name":"Essential Guide to Symmetric and Asymmetric Encryption in Cryptography","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.t5e0pTs8cwF7DbMEZc_hoAHaDL?pid=Api","datePublished":"2023-09-26T09:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fita.in/wp-content/uploads/2023/09/Types-of-Encryption-Systems.jpg","hostPageUrl":"https://www.fita.in/essential-guide-to-symmetric-and-asymmetric-encryption-in-cryptography/","contentSize":"96931 B","width":700,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.b797b4a53b3c73017b0db30465cfe1a0?rik=TdTbMf5WmNOz8w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"63EE5B4BFEAD3EDB6D11F3B3D39856FE31DBD44D","accentColor":"CB002C"},"BF09793CC9184504B726665650473793AF4A90D3":{"name":"Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bitO8dIDuFxhfwyIyDLIpgHaCX?pid=Api","datePublished":"2023-05-09T13:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-23-04594/article_deploy/html/images/sensors-23-04594-g001.png","hostPageUrl":"https://www.mdpi.com/1424-8220/23/10/4594","contentSize":"70736 B","width":2840,"height":910,"cDNContentUrl":"https://th.bing.com/th/id/R.6e2b4ef1d203b85c617f0c88c832c8a6?rik=%2b5CXw5yBVEB7Yg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3D09A4FA397374056566627B4054819CC39790FB","accentColor":"BD0E22"},"1F6231A36E8656C629D54EA0252F8D959D2C7301":{"name":"How do I secure/protect my wireless network by using WEP encryption on ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ij5lWcJoLJEmAe4l8ZRfMgHaDy?pid=Api","datePublished":"2015-07-30T10:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.tp-link.com/resources/images/faq/201052195638294.jpg","hostPageUrl":"https://www.tp-link.com/in/support/faq/257/","contentSize":"23375 B","width":575,"height":294,"cDNContentUrl":"https://th.bing.com/th/id/R.8a3e6559c2682c912601ee25f1945f32?rik=8SYTOuZoZWySXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1037C2D959D8F2520AE45D926C6568E63A1326F1","accentColor":"BC130F"},"FCFAFD8E02FD64F8F271DC2126D50A6D9224A0EC":{"name":"Data Encryption: Securing Data at Rest and in Transit with Encryption ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-GqxMZOg_LFf1HkF6pS47AHaEe?pid=Api","datePublished":"2023-08-19T07:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7op5bapw3acdlst15ez2.png","hostPageUrl":"https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies","contentSize":"564571 B","width":2000,"height":1210,"cDNContentUrl":"https://th.bing.com/th/id/R.f86ab13193a0fcb15fd47905ea94b8ec?rik=z6%2ff6CDfRo8vFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE0A4229D6A05D6212CD172F8F46DF20E8DFAFCF","accentColor":"12A23E"},"DA3F7494940AF2D2D2EA4912ECF6A9DD7BED5339":{"name":"What Is TLS (Transport Layer Security) And How It Works","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.NU19tt9whB9pGm2Ng24VPwHaFU?pid=Api","datePublished":"2022-09-09T14:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2022/09/image1.png","hostPageUrl":"https://www.hostinger.in/tutorials/what-is-tls","contentSize":"38787 B","width":1601,"height":1149,"cDNContentUrl":"https://th.bing.com/th/id/R.354d7db6df70841f691a6d8d836e153f?rik=rfNHSUmgLy0trg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9335DEB7DD9A6FCE2194AE2D2D2FA0494947F3AD","accentColor":"0434C7"},"A09479D47BB894BFD87F549F17C47698908057DF":{"name":"WannaCry Ransomware Inaunda Havoc Ulimwenguni Pote kwa Kutumia ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iXM0pod_Ywnuur3wHfmnNgHaD_?pid=Api","datePublished":"2025-09-08T17:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.seqrite.com/blog/wp-content/uploads/2017/05/WannaCryRansomwareEncryptedfiles.png","hostPageUrl":"https://www.seqrite.com/sw/blog/wannacry-ransomware-creating-havoc-worldwide-by-exploiting-patched-windows-exploit/","contentSize":"141213 B","width":515,"height":278,"cDNContentUrl":"https://th.bing.com/th/id/R.897334a6877f6309eebabdf01df9a736?rik=CkmXTbeLSfuN9w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FD75080989674C71F945F78DFB498BB74D97490A","accentColor":"AE1D23"},"A9F37E8080BE7DC74EA4692E4AAF97A0AE84200A":{"name":"Caesar cipher encryption and decryption python code solution ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.PPQ43F6kfoD-MfM9jMn0nQHaEK?pid=Api","datePublished":"2023-02-04T08:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.innovativecodesacademy.in/wp-content/uploads/2022/01/Caesar-cipher-encryption-1536x864.png","hostPageUrl":"http://www.innovativecodesacademy.in/caesar-cipher-encryption-and-decryption-python-code-solution/","contentSize":"107771 B","width":1536,"height":864,"cDNContentUrl":"https://th.bing.com/th/id/R.3cf438dc5ea47e80fe31f33d8cc9f49d?rik=mj%2fnCAjr13zkSg&riu=http%3a%2f%2fwww.innovativecodesacademy.in%2fwp-content%2fuploads%2f2022%2f01%2fCaesar-cipher-encryption-1536x864.png&ehk=DJZVlsSl%2bVqhf6i7lmb5CbFVqd7kBN4OibuRcZ149gk%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A00248EA0A79FAA4E2964AE47CD7EB0808E73F9A","accentColor":"B95812"},"38D78CF4A79AB0D9B3B43206BF82305516EE5A0E":{"name":"What are the five principal services provided by PGP - This ensures ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.str1GhQnWxe6i-VmNMl_VAHaJl?pid=Api","datePublished":"2023-03-02T02:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/cafbc97f42599d6042610165376111e5/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-are-the-five-principal-services-provided-by-pgp/48730654","contentSize":"159021 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.b2daf51a14275b17ba8be56634c97f54?rik=g33IT3qpC507Sw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E0A5EE61550328FB60234B3B9D0BA97A4FC87D83","accentColor":"424242"},"084084E947E2743DD76B6AD6E1F11B1E812C1390":{"name":"AES based encrypt and decrypt text in Python | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Ya1A8ElWnRDCg0pkEsdn3AHaET?pid=Api","datePublished":"2021-08-29T00:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/source-code/python-programming-sample/s44a.png","hostPageUrl":"https://slogix.in/source-code/python/programming-samples/how-to-encrypt-and-decrypt-text-using-aes-in-python/","contentSize":"42601 B","width":549,"height":319,"cDNContentUrl":"https://th.bing.com/th/id/R.61ad40f049569d10c2834a6412c767dc?rik=gARInnQuR9N9tg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0931C218E1B11F1E6DA6B67DD3472E749E480480","accentColor":"369734"},"BE02A6B023FBBFAFBEF8B81A51422126BCB53E37":{"name":"Types et méthodes de chiffrement des données : une introduction | Splunk","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.SdvR47ktRyvY0JgWjX1xbwHaFK?pid=Api","datePublished":"2025-05-10T03:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/triple-des2.png","hostPageUrl":"https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html","contentSize":"17218 B","width":602,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.49dbd1e3b92d472bd8d098168d7d716f?rik=6yBqCzK%2f%2b%2frrjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"73E35BCB62122415A18B8FEBFAFBBF320B6A20EB","accentColor":"666666"},"85E478B4DC5F29C1169DA21DABA90D85A66D020C":{"name":"An Efficient Encryption Algorithm for the Security of Sensitive Private ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.xWSbLS1NxnBoazwx5g2N8gHaJo?pid=Api","datePublished":"2019-10-25T09:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-08-01220/article_deploy/html/images/electronics-08-01220-g001.png","hostPageUrl":"https://www.mdpi.com/2079-9292/8/11/1220","contentSize":"101633 B","width":1983,"height":2578,"cDNContentUrl":"https://th.bing.com/th/id/R.c5649b2d2d4dc670686b3c31e60d8df2?rik=WE6HS831khxh2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C020D66A58D09ABAD12AD9611C92F5CD4B874E58","accentColor":"3B3B3B"},"A08796C755B52CE8D2D6D19ACB01E072996976E2":{"name":"What is Data Encryption?","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.RTJ1myfJYUHUcMOBuX_UkAHaEL?pid=Api","datePublished":"2017-08-17T07:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/encryption-1.jpg","hostPageUrl":"https://www.kaspersky.co.in/resource-center/definitions/encryption","contentSize":"124545 B","width":710,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.4532759b27c96141d470c381b97fd490?rik=CnhpfFVbwo4tbQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2E679699270E10BCA91D6D2D8EC25B557C69780A","accentColor":"1E8FAD"},"EDBEAFD55AACF97B40E90CE5B24D85CF40F7F79C":{"name":"Modified Advanced Encryption Standard Algorithm for Information Security","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.BHw0C_jDKfpVc0PkxQUX6wHaH0?pid=Api","datePublished":"2019-12-05T09:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/symmetry/symmetry-11-01484/article_deploy/html/images/symmetry-11-01484-g001.png?1577852041","hostPageUrl":"https://www.mdpi.com/2073-8994/11/12/1484","contentSize":"325910 B","width":1915,"height":2024,"cDNContentUrl":"https://th.bing.com/th/id/R.047c340bf8c329fa557343e4c50517eb?rik=3uv6XaXKn7cEng&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C97F7F04FC58D42B5EC09E04B79FCAA55DFAEBDE","accentColor":"776954"},"DC1B2BD5CF21E6B7E4ABE840F7E705BA7D3F8990":{"name":"How to Encrypt and Decrypt Text Online - Comprehensive Guide","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.y5veYRrxIwT7MPKOxkraOwHaC3?pid=Api","datePublished":"2024-06-10T17:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://converttools.app/Scripts/img/endetext3.PNG","hostPageUrl":"https://converttools.app/blog/how-to-encrypt-and-decrypt-text","contentSize":"17662 B","width":1237,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.cb9bde611af12304fb30f28ec64ada3b?rik=zbGyXfwSbntOug&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0998F3D7AB507E7F048EBA4E7B6E12FC5DB2B1CD","accentColor":"0639C5"},"0DFA212B9455B18EB002C8B23A9125186B97A68D":{"name":"A Lightweight Image Encryption Algorithm Based on Chaotic Map and ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.wKpFpMKL9ao24XFLqqdNFQHaId?pid=Api","datePublished":"2022-09-23T13:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/entropy/entropy-24-01344/article_deploy/html/images/entropy-24-01344-g001.png","hostPageUrl":"https://www.mdpi.com/1099-4300/24/10/1344","contentSize":"72245 B","width":1906,"height":2176,"cDNContentUrl":"https://th.bing.com/th/id/R.c0aa45a4c28bf5aa36e1714baaa74d15?rik=0K8SsklVG%2bgLIA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D86A79B6815219A32B8C200BE81B5549B212AFD0","accentColor":"454545"},"54A97EE6D8ECD3DF540778D25959CF1E1F0C2890":{"name":"OpenGL Projects: Encryption Decryption Computer Graphics Projects","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.2MCx6Dfo5uzm4tdg-h8DGAHaFc?pid=Api","datePublished":"2018-04-03T21:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI2Om6_aoLRdLdGoPNLQbh4kNdToe2v2C8WSZApbu1GUXzQofgYcHLAnYgGyjjr1jvQ86YMNgap6ZDTrUyyhSyUL48BQ0Yy3WmxJyzPUyS2optdPm-kTvEvirpUdWvHPxH5c6syKCtZNza/s1600/encryption+decryption+computer+graphics+projects.png","hostPageUrl":"https://www.openglprojects.in/2014/03/encryption-decryption-computer-graphics.html","contentSize":"8730 B","width":1015,"height":746,"cDNContentUrl":"https://th.bing.com/th/id/R.d8c0b1e837e8e6ece6e2d760fa1f0318?rik=RZrnbo3OPf1FcA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0982C0F1E1FC95952D877045FD3DCE8D6EE79A45","accentColor":"7A7B02"},"495E4BD0B7F14324D142E840F7E705BA7D3F8990":{"name":"How to Encrypt and Decrypt Text Online - Comprehensive Guide","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.e0rWAXy_KyAKHD20DWgPcwHaCt?pid=Api","datePublished":"2024-06-10T17:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://converttools.app/Scripts/img/endetext2.PNG","hostPageUrl":"https://converttools.app/blog/how-to-encrypt-and-decrypt-text","contentSize":"16150 B","width":1209,"height":443,"cDNContentUrl":"https://th.bing.com/th/id/R.7b4ad6017cbf2b200a1c3db40d680f73?rik=lOW0DXsfNEIdJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0998F3D7AB507E7F048E241D42341F7B0DB4E594","accentColor":"0538C6"},"7069DCBE602AE64C48DEB32ECA0A51B1C777DA2F":{"name":"E PGP B2 program manual - Sample example for exam use use it wisely ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.6YRapoiuoad0zk6gVhsmQgHaKd?pid=Api","datePublished":"2022-07-30T02:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/5f59c3402434de08b8bd705fe1a808f1/thumb_1200_1696.png","hostPageUrl":"https://www.studocu.com/in/document/indian-institute-of-management-raipur/executive-mba/e-pgp-b2-program-manual-sample-example-for-exam-use-use-it-wisely/29173002","contentSize":"926892 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.e9845aa688aea1a774ce4ea0561b2642?rik=B5bN6waibsSE7Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F2AD777C1B15A0ACE23BED84C46EA206EBCD9607","accentColor":"24376A"},"B47C3665C3DD6D9D3E91C45764F239721158F550":{"name":"Q11Key - RSA Encryption Algorithm Overview and Example - Studocu","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.MDMZbzGJerg7ilEP5-30_AHaEK?pid=Api","datePublished":"2025-12-03T01:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/08944cc30644f3ea0deaf396bf39a667/thumb_784_441.png","hostPageUrl":"https://www.studocu.com/in/document/jntua-college-of-engineering-anantapuram/bachelor-of-technology/q11key-rsa-encryption-algorithm-overview-and-example/147436153","contentSize":"94502 B","width":784,"height":441,"cDNContentUrl":"https://th.bing.com/th/id/R.3033196f31897ab83b8a510fe7edf4fc?rik=S8djVjzd1tnjGQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"055F851127932F46754C19E3D9D6DD3C5663C74B","accentColor":"626569"},"2FC214027F5D04B27CB0E46F3AAA432A8677C7D5":{"name":"What is End-to-End Encryption: E2EE Explained For Beginners | nasscom ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.owatA3qzuCOvIJD3TVoDnQHaG6?pid=Api","datePublished":"2023-06-23T10:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.zeeve.io/wp-content/uploads/2023/06/End-to-end-encryption-02-2048x1914.jpg","hostPageUrl":"https://community.nasscom.in/communities/blockchain/what-end-end-encryption-e2ee-explained-beginners","contentSize":"277640 B","width":2048,"height":1914,"cDNContentUrl":"https://th.bing.com/th/id/R.a306ad037ab3b823af2090f74d5a039d?rik=8ixBIPfVQCvHCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D7C7768A234AAA3F64E0BC72B40D5F720412CF2","accentColor":"004C69"},"8987BE014BEEDC68F826E840F7E705BA7D3F8990":{"name":"How to Encrypt and Decrypt Text Online - Comprehensive Guide","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iVOLZjnlI69ne6TDAnBJJwHaB4?pid=Api","datePublished":"2024-06-10T17:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://converttools.app/Scripts/img/endetext4.PNG","hostPageUrl":"https://converttools.app/blog/how-to-encrypt-and-decrypt-text","contentSize":"6387 B","width":1229,"height":312,"cDNContentUrl":"https://th.bing.com/th/id/R.89538b6639e523af677ba4c302704927?rik=mHjrELTuzYaPYg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0998F3D7AB507E7F048E628F86CDEEB410EB7898","accentColor":"6A6661"},"68BD5E69C312440BAD5938709486CECB297A580F":{"name":"PGP College Of Arts & Science","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.WbFdT2rrlNGdYRrePL7LpAHaHE?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pgpartscollege.ac.in/images/about/home7.jpg","hostPageUrl":"https://www.pgpartscollege.ac.in/","contentSize":"117560 B","width":650,"height":620,"cDNContentUrl":"https://th.bing.com/th/id/R.59b15d4f6aeb94d19d611ade3cbecba4?rik=htvlljwhRLDalQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F085A792BCEC6849078395DAB044213C96E5DB86","accentColor":"C71B04"},"FEF68C5FAAF610DCD4546B0DE5357AFCB6BC27B1":{"name":"How to Encrypt and Decrypt Connection Strings in Web.Config File","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7g7WTeO6jUfd1H-Tn6G1-wHaDJ?pid=Api","datePublished":"2017-12-13T08:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.encodedna.com/aspdotnet/encrypted-webconfig-connection-string.png","hostPageUrl":"https://www.encodedna.com/aspdotnet/encrypt-and-decrypt-connection-strings-in-webconfig-visual-studio-2010.htm","contentSize":"12247 B","width":752,"height":320,"cDNContentUrl":"https://th.bing.com/th/id/R.ee0ed64de3ba8d47ddd47f939fa1b5fb?rik=72%2fI9apvAc1NRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1B72CB6BCFA7535ED0B6454DCD016FAAF5C86FEF","accentColor":"0E00CC"},"71C7E75DDB5C47178190CB058C4EDD295A159B46":{"name":"IIMA - One-Year Full Time PGP in Management for Executives (MBA-PGPX)","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.G8Db25QsMwdQQEmQwyUXEwHaHa?pid=Api","datePublished":"2022-11-03T20:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.iima.ac.in/sites/default/files/2023-09/111.jpg","hostPageUrl":"https://www.iima.ac.in/academics/MBA-PGPX","contentSize":"947706 B","width":2554,"height":2554,"cDNContentUrl":"https://th.bing.com/th/id/R.1bc0dbdb942c330750404990c3251713?rik=F3x%2b1b3FdHEYCQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"64B951A592DDE4C850BC09187174C5BDD57E7C17","accentColor":"BF8D0C"},"F54311C951797B82A502630B002E580952EB40F3":{"name":"PGP Student Portal","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5S2D-63froZ_COK_3zMulQAAAA?pid=Api","datePublished":"2021-10-29T09:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ltp.iima.ac.in/pgp/grades/user/assets/img/logo.png","hostPageUrl":"https://ltp.iima.ac.in/pgp/grades/user/index.php","contentSize":"11731 B","width":150,"height":163,"cDNContentUrl":"https://th.bing.com/th/id/R.e52d83fbaddfae867f08e2bfdf332e95?rik=XzQRnBWXtyhaIA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"3F04BE259085E200B036205A28B797159C11345F","accentColor":"666666"},"CE209E54197B19005F10235B5E90FC225FAAE8CA":{"name":"AES Encryption and Decryption in PHP See example | Web Technology ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.AxX0gNds3juOnwEKCvVZuAAAAA?pid=Api","datePublished":"2018-01-13T14:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsyM1_CNbdBcIfkR-RYyjV9IXEntlnBaNPt7BLfhsv2igH5OUm77XMr2iMIu2dzzs2lzbsZlrhBlCueEjl0fnugRfDZggXN1zhAJ9DvOL0ItJAi2m9btJZ_tACnpNsuTSCvLKSxZE9CplD/w1200-h630-p-k-no-nu/AES+Encryption+and+Decryption+in+PHP+See+example.png","hostPageUrl":"https://www.web-technology-experts-notes.in/2016/03/aes-encryption-and-decryption-in-php-view-example.html","contentSize":"24497 B","width":469,"height":246,"cDNContentUrl":"https://th.bing.com/th/id/R.0315f480d76cde3b8e9f010a0af559b8?rik=7ALpRZG3kQD1AQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AC8EAAF522CF09E5B53201F50091B79145E902EC","accentColor":"6C401B"},"17732398F3B2C0A766D5AF58CAEA6A437472BC97":{"name":"PGP College of Engineering and Technology","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.xQnQfHtXSWBMplPw6GDvQAHaCA?pid=Api","datePublished":"2020-04-11T10:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pgpcet.ac.in/images/pgp_images/placement3.jpg","hostPageUrl":"https://pgpcet.ac.in/","contentSize":"307719 B","width":1050,"height":285,"cDNContentUrl":"https://th.bing.com/th/id/R.c509d07c7b5749604ca653f0e860ef40?rik=cTcyiT8rDHpmXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"79CB274734A6AEAC85FA5D667A0C2B3F89323771","accentColor":"BE990D"},"3F992E9AA5F2E6E2BAF3ACACB3457140BD836FEB":{"name":"Our Gallery","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.6b09opvVwd_eRCZrNF0OUgHaDy?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgpnursing.edu.in/overall_gallery_images/OVERALL_GALLERY_2023-09-04%2010_34_18_1.png","hostPageUrl":"https://pgpnursing.edu.in/","contentSize":"143956 B","width":1519,"height":777,"cDNContentUrl":"https://th.bing.com/th/id/R.e9bd3da29bd5c1dfde44266b345d0e52?rik=85niqVovbi6rPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BEF638DB0417543BCACA3FAB2E6E2F5AA9E299F3","accentColor":"604C49"},"C5FC3543D3C5AF5AD1CF750FF4F54EB1FA5A7769":{"name":"What is Elliptic Curve Cryptography (ECC) Discuss ECC algorithm with ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.y0ENmn-Bw1byCD0t1brCWAHaJl?pid=Api","datePublished":"2023-03-02T02:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fab92a17457959c344d7273f210a4b31/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-is-elliptic-curve-cryptography-ecc-discuss-ecc-algorithm-with-neat-diagram/48980482","contentSize":"175643 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.cb410d9a7f81c356f2083d2dd5bac258?rik=XM9TND1c%2bqUd%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9677A5AF1BE45F4FF057FC1DA5FA5C3D3453CF5C","accentColor":"C93102"},"A164F99E958092061DA78219DA004078BFECFB00":{"name":"PGP College of Engineering and Technology","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZOuy-wyGEjmEjRxtzbODsQHaCA?pid=Api","datePublished":"2014-02-03T04:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://pgpcet.ac.in/images/pgp_images/pgp.jpg","hostPageUrl":"http://www.pgpcet.ac.in/","contentSize":"101314 B","width":1400,"height":380,"cDNContentUrl":"https://th.bing.com/th/id/R.64ebb2fb0c861239848d1c6dcdb383b1?rik=Gkaf6VkIKWDReg&riu=http%3a%2f%2fpgpcet.ac.in%2fimages%2fpgp_images%2fpgp.jpg&ehk=%2bbJXpOnh43GcW2gIMh16VbNHmhe3ZK1rERb%2b%2fBQlKcc%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00BFCEFB870400AD91287AD160290859E99F461A","accentColor":"986334"},"2B168FE3FC89BE882F3DD2A3591B21A6038832C8":{"name":"Virtual Labs","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.uGjreDAA_6RnqrsNLYLFsgHaFl?pid=Api","datePublished":"2021-08-26T22:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/images/image2.png","hostPageUrl":"https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/theory.html","contentSize":"60474 B","width":663,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.b868eb783000ffa467aabb0d2d82c5b2?rik=smH4Ps%2bY64jy0w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8C2388306A12B1953A2DD3F288EB98CF3EF861B2","accentColor":"296AA2"},"F3FC486EC82A459CB4FAC4646DD6B97B4F0A9422":{"name":"A closer look at the MU Online packet encryption","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Bv0KLI1YW8SxxTR13VSQ1AAAAA?pid=Api","datePublished":"2017-12-22T08:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://munique.net/content/images/2018/09/key.PNG","hostPageUrl":"https://munique.net/a-closer-look-at-the-mu-online-packet-encryption/","contentSize":"4736 B","width":455,"height":84,"cDNContentUrl":"https://th.bing.com/th/id/R.06fd0a2c8d585bc4b1c53475dd5490d4?rik=P8%2bE5oyiVMlLrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2249A0F4B79B6DD6464CAF4BC954A28CE684CF3F","accentColor":"036FC8"},"F31AF08BEF03EC3F69B905B5D7438536DF4E0EF6":{"name":"PGP College of Pharmaceutical Science and Research Institute Namakkal ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.pnokxShtgxwo4oAqpLCI-QHaD7?pid=Api","datePublished":"2024-08-20T09:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.collegebatch.com/static/clg-gallery/pgp-college-of-pharmaceutical-science-and-research-institute-namakkal-111759.png","hostPageUrl":"https://www.collegebatch.com/11183-pgp-college-of-pharmaceutical-science-and-research-institute-campus-tour-namakkal","contentSize":"30284 B","width":500,"height":265,"cDNContentUrl":"https://th.bing.com/th/id/R.a67a24c5286d831c28e2802aa4b088f9?rik=P6EPuP4wzvOWmw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6FE0E4FD6358347D5B509B96F3CE30FEB80FA13F","accentColor":"505B14"},"B01CBCC9EC953BFC5FAE0BCF480E144FF2D902EE":{"name":"Verify Hash | IntelliBuddies® Documentation Portal","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.uq0tNvw43IlEgUuWtGoBLAAAAA?pid=Api","datePublished":"2025-01-18T18:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://docs.intellibuddies.com/assets/images/img-hash-verify-text-example-7eda7be7cb16a3c81f8ffe94ed0013b3.png","hostPageUrl":"https://docs.intellibuddies.com/docs/activities/verify-hash/","contentSize":"18378 B","width":352,"height":553,"cDNContentUrl":"https://th.bing.com/th/id/R.baad2d36fc38dc8944814b96b46a012c?rik=C8HLnM5Zs8%2f16g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EE209D2FF441E084FCB0EAF5CFB359CE9CCBC10B","accentColor":"BF920C"},"30A3B81C4BB8AD1F41D23D6786DAC6C41267742E":{"name":"Full Disk Encryption | Devuan GNU+Linux Free Operating System","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.FbRwPSwV8iwCRSqPYChykAHaFj?pid=Api","datePublished":"2020-06-10T04:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt1.png","hostPageUrl":"https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption","contentSize":"7545 B","width":640,"height":480,"cDNContentUrl":"https://th.bing.com/th/id/R.15b4703d2c15f22c02452a8f60287290?rik=AzqLwbSL2vEULQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E24776214C6CAD6876D32D14F1DA8BB4C18B3A03","accentColor":"0000A9"},"AD7FD0EE25A0EADA241CFDF6243F2DDAAD310CE0":{"name":"ISB PGP PRO: Executive MBA for Working Professionals","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.k4AULKinphhJ8403YxPCygHaFj?pid=Api","datePublished":"2020-07-19T12:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2Fvnzpvpd4%2Fapply-now-pgp-pro-2.jpg%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75","hostPageUrl":"https://www.isb.edu/programmes/post-graduate-programmes/pgp-pro","contentSize":"122431 B","width":1920,"height":1440,"cDNContentUrl":"https://th.bing.com/th/id/R.9380142ca8a7a61849f38d376313c2ca?rik=2vcN7lIKrq1CwQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0EC013DAADD2F3426FDFC142ADAE0A52EE0DF7DA","accentColor":"604130"},"8C750E7A208C3C68EC095867DD53B18192973AB0":{"name":"Group 5 - GBS (B) - Coe's Case - 15th June submisson - Aparna R Jayan ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.K_9DvYw2lxIVuvmK7pU-uwHaJl?pid=Api","datePublished":"2022-12-25T17:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/c490b5741984570318a1b099a00d5bad/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/indian-institute-of-management-kozhikode/managing-business-market/group-5-gbs-b-coes-case-15th-june-submisson/32532907","contentSize":"206128 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.2bff43bd8c36971215baf98aee953ebb?rik=yFfgpwLIw4bOkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0BA37929181B35DD768590CE86C3C802A7E057C8","accentColor":"3E3E3E"},"30BDA8DE08AED664F64B38709486CECB297A580F":{"name":"PGP College Of Arts & Science","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.CZtWezXJKWMk5tRHBbBPOgHaC4?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pgpartscollege.ac.in/images/slider/slider-2.jpg","hostPageUrl":"https://www.pgpartscollege.ac.in/","contentSize":"830974 B","width":2000,"height":777,"cDNContentUrl":"https://th.bing.com/th/id/R.099b567b35c9296324e6d44705b04f3a?rik=A9uK7YDqbUZvtA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F085A792BCEC68490783B46F466DEA80ED8ADB03","accentColor":"7F644C"},"D48314A1EB2D7CB82C274BB4996DBB374BFB2D77":{"name":"PGP-06-CV | Hunter Industries","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Qlk6lKsyT9gCrQUpBMKa_gHaHa?pid=Api","datePublished":"2023-08-17T21:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hunterirrigation.com/sites/default/files/imported_images/PGP-06_001_RT.png","hostPageUrl":"https://www.hunterirrigation.com/irrigation-product/pgpr-ultra/pgp-06-cv","contentSize":"162485 B","width":1080,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.42593a94ab324fd802ad052904c29afe?rik=TThBGr7Sx4vCcg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"77D2BFB473BBD6994BB472C28BC7D2BE1A41384D","accentColor":"043CC7"},"B11B4B7024AE42B010CF962732FDC77F29B5670E":{"name":"Top 6 Smart Text Encryption Software","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.RaXVxAImPB46JxRGw3pr2QHaFf?pid=Api","datePublished":"2017-12-29T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/pdfelement/pdf-business-tips/gizmomarks.jpg","hostPageUrl":"https://pdf.wondershare.com/business/text-encryption.html","contentSize":"87291 B","width":794,"height":588,"cDNContentUrl":"https://th.bing.com/th/id/R.45a5d5c402263c1e3a271446c37a6bd9?rik=G7G0B0LqJAsB%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E0765B92F77CDF237269FC010B24EA4207B4B11B","accentColor":"1897B3"},"798F00BF2F4DA66C7DEED92AB1D1673F6071D4F3":{"name":"Grade R English - Basic Phrases - Word Cards: The Weather","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Rxtxo14K0aXYcK84yPpn9gHaDt?pid=Api","datePublished":"2024-07-31T13:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/eb/cd/za-hl-1705392578-grade-r-basic-phrases-the-weather_ver_1.jpg","hostPageUrl":"https://www.twinkl.co.in/resource/grade-r-basic-phrases-the-weather-za-hl-1705392578","contentSize":"55705 B","width":630,"height":315,"cDNContentUrl":"https://th.bing.com/th/id/R.471b71a35e0ad1a5d870af38c8fa67f6?rik=l%2fgA%2b%2fLUasbX7g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3F4D1706F3761D1BA29DEED7C66AD4F2FB00F897","accentColor":"C69305"},"FE3E5E41133A461D35827095ACFD71AE7BEA851B":{"name":"ISB PGP: Global Top One-Year Management Programme","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.laqALQFKmHmO7aqDlaksbAHaDw?pid=Api","datePublished":"2017-06-06T10:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2Fw1epuutk%2Fisb-pgp-hyderabad-1.webp%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75","hostPageUrl":"https://www.isb.edu/programmes/post-graduate-programmes/pgp-in-management","contentSize":"114407 B","width":1920,"height":975,"cDNContentUrl":"https://th.bing.com/th/id/R.95aa802d014a98798eedaa8395a92c6c?rik=7%2bPlFDGjZNFTKA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B158AEB7EA17DFCA59072853D164A33114E5E3EF","accentColor":"2049AB"},"D7A55A6F20006607B6CE3DA65161EDE2A4E34C93":{"name":"IOT: A comparative study of different encryption techniques: Buy IOT: A ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.dKe0yAyadHX9pL9eUFaXXgAAAA?pid=Api","datePublished":"2022-07-31T13:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/kjswia80/book/q/r/e/iot-a-comparative-study-of-different-encryption-techniques-original-imafzafjd8u46gmx.jpeg","hostPageUrl":"https://www.flipkart.com/iot-comparative-study-different-encryption-techniques/p/itm579eb4e899bf8","contentSize":"13714 B","width":200,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.74a7b4c80c9a7475fda4bf5e5056975e?rik=fVql9gIAZnBr7A&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkjswia80%2fbook%2fq%2fr%2fe%2fiot-a-comparative-study-of-different-encryption-techniques-original-imafzafjd8u46gmx.jpeg&ehk=gu1wo%2fr%2fgJW%2b9ogbFY69maAMliZojzqi6L4udZBmIMU%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"39C43E4A2EDE16156AD3EC6B70660002F6A55A7D","accentColor":"AA2122"},"E089027FC1CC8E6E320638709486CECB297A580F":{"name":"PGP College Of Arts & Science","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.nAO1jBrDXb9NHQt4Hot7qgHaBa?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pgpartscollege.ac.in/images/pgp-arts/pgp-logo.webp","hostPageUrl":"https://www.pgpartscollege.ac.in/","contentSize":"114004 B","width":879,"height":168,"cDNContentUrl":"https://th.bing.com/th/id/R.9c03b58c1ac35dbf4d1d0b781e8b7baa?rik=Dpgg9xzM6OYjYA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F085A792BCEC684907836023E6E8CC1CF720980E","accentColor":"B31829"},"DE73315171F2160F99A6088B7FB9439A3C362193":{"name":"PGP Educational Institutions, Namakkal","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.1w_kU_0k-JNm42-NA6r4ngHaGA?pid=Api","datePublished":"2023-03-22T05:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgpews.in/intlschool_logo.png","hostPageUrl":"https://pgpews.in/","contentSize":"38635 B","width":500,"height":406,"cDNContentUrl":"https://th.bing.com/th/id/R.d70fe453fd24f89366e36f8d03aaf89e?rik=7TcTFRcvYfCZag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"391263C3A9349BF7B8806A99F0612F17151337ED","accentColor":"09378B"},"19E470CD17F0CB15E3EBFDF6243F2DDAAD310CE0":{"name":"ISB PGP PRO: Executive MBA for Working Professionals","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.02jKcT48ONpSCm0icaik5wHaDw?pid=Api","datePublished":"2020-07-19T12:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2F1dec2a2t%2Fpgp-pro-2.jpg%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75","hostPageUrl":"https://www.isb.edu/programmes/post-graduate-programmes/pgp-pro","contentSize":"136180 B","width":1920,"height":975,"cDNContentUrl":"https://th.bing.com/th/id/R.d368ca713e3c38da520a6d2271a8a4e7?rik=kU4H3HEPvFE%2bvg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0EC013DAADD2F3426FDFBE3E51BC0F71DC074E91","accentColor":"91503A"},"D65518FA354300A5BDD9279585B68B5C687BF3D9":{"name":"PGP Polytechnic College, Namakkal","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.g1304SF2uljdGMiSP2qVKgHaE6?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgppolytechnic.edu.in/slider_images/SLIDER3_2021-06-07%2013_23_16.png","hostPageUrl":"https://pgppolytechnic.edu.in/","contentSize":"1215804 B","width":4288,"height":2848,"cDNContentUrl":"https://th.bing.com/th/id/R.835df4e12176ba58dd18c8923f6a952a?rik=bVWBr1M0AFrbnQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9D3FB786C5B86B5859729DDB5A003453AF81556D","accentColor":"7F883B"},"3DE2517F7B2CE2406C42083FA5FEDC7E860BA742":{"name":"PGP College of Physiotherapy, Namakkal (IN)","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Y6D2_X0wCQ9MfXPP_Q769QHaEh?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgpcopt.edu.in/post_images/POST_2022-05-20%2011_27_57.png","hostPageUrl":"https://pgpcopt.edu.in/","contentSize":"90624 B","width":1280,"height":782,"cDNContentUrl":"https://th.bing.com/th/id/R.63a0f6fd7d30090f4c7d73cffd0efaf5?rik=0y4V97fCLgTGJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"247AB068E7CDEF5AF38024C6042EC2B7F7152ED3","accentColor":"232A5B"},"B7F97B672C3E87CE274F681D049A1FC0FAC2E83A":{"name":"Indian Institute of Management Kozhikode - IIMK","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.K4IAOHGieApEcQJw1hjpfAHaLH?pid=Api","datePublished":"2021-09-24T00:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://iimk.ac.in/uploads/admission_application/medium/PGP_25_301.jpg","hostPageUrl":"https://iimk.ac.in/studentAchievements/pgp","contentSize":"1235775 B","width":1200,"height":1800,"cDNContentUrl":"https://th.bing.com/th/id/R.2b82003871a2780a44710270d618e97c?rik=e5%2b3dsLjeOxy9A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A38E2CAF0CF1A940D186F472EC78E3C276B79F7B","accentColor":"344963"},"0708A1A9E81DB1CC2771321F6A40B5B3D4F940C5":{"name":"PGP Title Office Photos","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.1kIpfdgQ61hvMAq4ZjSfawAAAA?pid=Api","datePublished":"2022-02-07T19:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.glassdoor.com/lst2x/1609448/pgp-title-office.jpg","hostPageUrl":"https://www.glassdoor.co.in/Photos/PGP-Title-Office-Photos-IMG1192835.htm","contentSize":"23963 B","width":420,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.d642297dd810eb586f300ab866349f6b?rik=cIAamo7RG8xyFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5C049F4D3B5B04A6F1231772CC1BD18E9A1A8070","accentColor":"455C86"},"34EEC6E4A778F7301B371D633228C661EC9CDAA5":{"name":"PGP College of Pharmaceutical Science and Research Institute, Namakkal","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.X83RXuQQgTWU6aT21FAbwAHaCO?pid=Api","datePublished":"2021-07-24T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgppharmacy.edu.in/img/logo/logo_new.jpeg","hostPageUrl":"https://pgppharmacy.edu.in/","contentSize":"12098 B","width":500,"height":150,"cDNContentUrl":"https://th.bing.com/th/id/R.5fcdd15ee410813594e9a4f6d4501bc0?rik=Q%2b5sTnqHfwOxcw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5AADC9CE166C822336D173B1037F877A4E6CEE43","accentColor":"0C3179"},"DF761A85DC1BE9C2E27133E942AF23A83AC13C80":{"name":"PGP Glass nimmt neue Greenfield Glasanlage von HORN in Betrieb","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0tnK3K58bXCt0yB-5-VtPAHaFD?pid=Api","datePublished":"2021-10-17T15:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.hornglass.com/fileadmin/_processed_/7/e/csm_3_21e04e0c3b.jpg","hostPageUrl":"https://www.hornglass.com/de/unternehmen/news/detail/pgp-glass-nimmt-neue-greenfield-glasanlage-von-horn-in-betrieb","contentSize":"258666 B","width":1200,"height":820,"cDNContentUrl":"https://th.bing.com/th/id/R.d2d9cadcae7c6d70add3207ee7e56d3c?rik=%2fWehWM2xniwuFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"08C31CA38A32FA249E33172E2C9EB1CD58A167FD","accentColor":"A55126"},"54054AE280A3BCD18E1B5CE6DD150B95903E2329":{"name":"What to Know About PCI DSS Compliance and Email","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.iHxD1HBXsnjGrTNtZD90BwHaGf?pid=Api","datePublished":"2020-11-05T17:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.acodez.in/wp-content/uploads/2020/11/virtru-email-encryption.png","hostPageUrl":"https://acodez.in/pci-compliance-email-credit-card-information/","contentSize":"25359 B","width":479,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.887c43d47057b278c6ad336d643f7407?rik=RVCkLgg6yx3osQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"9232E30959B051DD6EC5B1E81DCB3A082EA45045","accentColor":"0144CA"},"90EFA2FCA2CFE6E9A77C088B7FB9439A3C362193":{"name":"PGP Educational Institutions, Namakkal","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ZMORI7AdjRIuDArMe-8YbQHaGi?pid=Api","datePublished":"2023-03-22T05:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pgpews.in/arts_logo.png","hostPageUrl":"https://pgpews.in/","contentSize":"28175 B","width":500,"height":441,"cDNContentUrl":"https://th.bing.com/th/id/R.64c39123b01d8d122e0c0acc7bef186d?rik=Cf4qzyr8bp56xw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"391263C3A9349BF7B880C77A9E6EFC2ACF2AFE09","accentColor":"001052"},"23BDA731CCF969488E6F76DEAC8242740661BCB1":{"name":"Reimagining Management for Social Change | ISDM","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.qZ3nni4mToAsPmT4lECE6AHaHa?pid=Api","datePublished":"2016-09-07T17:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.isdm.org.in/sites/default/files/2023-12/admission-open-for-pgp-dm.jpg","hostPageUrl":"https://www.isdm.org.in/","contentSize":"133110 B","width":1250,"height":1250,"cDNContentUrl":"https://th.bing.com/th/id/R.a99de79e2e264e802c3e64f8944084e8?rik=Mtt6E8yfloTo9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1BCB1660472428CAED67F6E884969FCC137ADB32","accentColor":"0E4282"},"9D111C347370779CC96FF132BE53144F1EB867EB":{"name":"helpBIOTECH","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.FEEIdd5XPnrG9a_CiNzaVAAAAA?pid=Api","datePublished":"2019-05-03T14:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiodL8omMrv0SCSJunSwCZTc1NJo8qvOFZ5pKcUDiH0acULo5RPR_EdINwp1iZrchyphenhyphen0Sg5YYLdZbulxTKVjj-PaCaYQmPmmvX2Qi8yYF4nrTckVojlhdNOpThBLbY_lRYWkm8GDSb6UPk-j2daCt4SuOzFfo7ryELAmdg6eNk3K1nD5SA58PwUXithbn_8Q/w680/PGP-College.png","hostPageUrl":"https://www.helpbiotech.co.in/search/label/Jobs","contentSize":"180576 B","width":439,"height":435,"cDNContentUrl":"https://th.bing.com/th/id/R.14410875de573e7ac6f5afc288dcda54?rik=2RHBQzcHd8mc9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BE768BE1F44135EB231FF69CC977073743C111D9","accentColor":"BAB211"},"D8D2D801023DE1D9CBBED8E4C113D11CBF072A7C":{"name":"Data Encryption Standard in hindi (DES in hindi)","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.jthSDGBvo7MwW9d6qsSi7wHaHJ?pid=Api","datePublished":"2022-11-01T07:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiEGzDtYaLNikPQIdsBjJOPmPiXO3t4-zfMCWWk9Gg0CPafelQSvcF6h66FlcE0kUZG1aySEWKG3S-5OZZkyqsvfKX9dv-XhB4azV_1InGA4SqlEu_AIUDAqn6i64mfiHzLg80iZb20trxB9-7qpwd-Mts_FhjN1HyXtWuoyYQPqGckGt1niHF__hTaQ/w653-h630/sub.png","hostPageUrl":"https://www.computernetworksite.in/2022/10/data-encryption-standard-in-hindi.html","contentSize":"45689 B","width":653,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.8ed8520c606fa3b3305bd77aaac4a2ef?rik=jS2NECDTHp286w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C7A270FBC11D311C4E8DEBBC9D1ED320108D2D8D","accentColor":"018DCA"},"A7555D0679B527DD0AEA76DEAC8242740661BCB1":{"name":"Reimagining Management for Social Change | ISDM","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.MlKK4W29FNvlckeNsnu34gHaHa?pid=Api","datePublished":"2016-09-07T17:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.isdm.org.in/sites/default/files/2024-12/pgp-dm-admission-launch.jpg","hostPageUrl":"https://www.isdm.org.in/","contentSize":"102290 B","width":800,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.32528ae16dbd14dbe572478db27bb7e2?rik=elXVYJdbct2grg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1BCB1660472428CAED67AEA0DD725B9760D5557A","accentColor":"A97622"},"535600142064EFCFB6C138709486CECB297A580F":{"name":"PGP College Of Arts & Science","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.XYf7Ort30m6etHIMEMdcawHaBa?pid=Api","datePublished":"2022-09-01T10:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pgpartscollege.ac.in/images/image/logo.png","hostPageUrl":"https://www.pgpartscollege.ac.in/","contentSize":"49405 B","width":879,"height":168,"cDNContentUrl":"https://th.bing.com/th/id/R.5d87fb3abb77d26e9eb4720c10c75c6b?rik=NWUAQQJG%2fvxrHA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"F085A792BCEC684907831C6BFCFE460241006535","accentColor":"B41726"},"CD872A63B08E95F9B0C771A67321D8AA080D1490":{"name":"WD Western Digital 2Tb My Passport Portable Ssd, 1050Mb/S R, 1000Mb/S W ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QM2s9JElg98Dg3oTST4p4AHaNc?pid=Api","datePublished":"2021-10-22T23:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81YQgC-lRRL._AC_.jpg","hostPageUrl":"https://www.amazon.in/Western-Digital-Passport-Protection-Encryption/dp/B08HDLYM8P","contentSize":"365622 B","width":1086,"height":1972,"cDNContentUrl":"https://th.bing.com/th/id/R.40cdacf4912583df03837a13493e29e0?rik=3HiiNgvoWZ8LfA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0941D080AA8D12376A177C0B9F59E80B36A278DC","accentColor":"44210D"},"81BED88B81E4C298B3D694112B276ADA8544B3D7":{"name":"Photo Gallery","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.d8hQpxEtQLa68HTKeHgXXAAAAA?pid=Api","datePublished":"2024-04-13T11:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://forms.iimk.ac.in/convocation26/albums/PGP/thumbs/DSC01929.JPG","hostPageUrl":"https://forms.iimk.ac.in/convocation26/photogallery.php","contentSize":"116325 B","width":150,"height":100,"cDNContentUrl":"https://th.bing.com/th/id/R.77c850a7112d40b6baf074ca7878175c?rik=GOuNuBhOLIk7bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7D3B4458ADA672B211496D3B892C4E18B88DEB18","accentColor":"0C9ABF"},"7869134BAF333BF44AE594112B276ADA8544B3D7":{"name":"Photo Gallery","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Nyy7ekz0WHeYGrD07FvZ-gAAAA?pid=Api","datePublished":"2024-04-13T11:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://forms.iimk.ac.in/convocation26/albums/PGP-LSM/thumbs/DSC04000.JPG","hostPageUrl":"https://forms.iimk.ac.in/convocation26/photogallery.php","contentSize":"116187 B","width":150,"height":100,"cDNContentUrl":"https://th.bing.com/th/id/R.372cbb7a4cf45877981ab0f4ec5bd9fa?rik=h5YxtPozs0%2bkXg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7D3B4458ADA672B211495EA44FB333FAB4319687","accentColor":"0638C5"},"3D34D943F747C706DF2F9DAE389A57E12B251A5C":{"name":"Indian Institute of Management Kozhikode - IIMK","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.OnjSjJJiAIsMig6COrkNdQHaEX?pid=Api","datePublished":"2022-07-04T08:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://iimk.ac.in/uploads/userfiles/2-%20Chief%20Guest%20Abraham%20Stephanos,%20Guest%20of%20Honour%20Prashant%20Nair%20with%20Director%20Debashis%20Chaterjee%20and%20Deans%20during%20IIMK%20programme%20inauguration(1).jpg","hostPageUrl":"https://iimk.ac.in/announcements/pgp-26-inauguration","contentSize":"1929617 B","width":2688,"height":1584,"cDNContentUrl":"https://th.bing.com/th/id/R.3a78d28c9262008b0c8a0e823ab90d75?rik=00OdNH90fGD98g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C5A152B21E75A983EAD9F2FD607C747F349D43D3","accentColor":"72422B"},"F1601BB5CFDFD780881BC775475B2212122A116E":{"name":"Sandisk Extreme Portable 1TB, 1050MB/s R, 1000MB/s W, 3mtr Drop ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.p5xwp3S1tQyf0qHsGKGI7gAAAA?pid=Api","datePublished":"2023-07-24T11:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41eTFK7clfL._AC_.jpg","hostPageUrl":"https://www.amazon.in/Sandisk-Protection-Resistance-Encryption-Smartphone/dp/B0C59G4TLQ","contentSize":"24345 B","width":217,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.a79c70a774b5b50c9fd2a1ec18a188ee?rik=HwaxW%2fz9fQiIsQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E611A2212122B574577CB188087DFDFC5BB1061F","accentColor":"AA3A21"},"08103C8742B138E494A2C3DDDF080AB3A2215F9C":{"name":"Java - Encryption and Decryption of an Image Using Blowfish Algorithm","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.r9CAOVzNqK71qkLsIMTExwHaEK?pid=Api","datePublished":"2018-07-26T14:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://farm6.staticflickr.com/5486/9487017392_d5d0be206b_b_d.jpg","hostPageUrl":"https://www.theinsanetechie.in/2013/08/java-encryption-and-decryption-of-image.html","contentSize":"79986 B","width":1024,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.afd080395ccda8aef5aa42ec20c4c4c7?rik=gAHDeCQbg05JKg&riu=http%3a%2f%2ffarm6.staticflickr.com%2f5486%2f9487017392_d5d0be206b_b_d.jpg&ehk=g5WEroSHVAiSRFTe%2bx4%2frj2t4cK2vEs5HV146xou25A%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C9F5122A3BA080FDDD3C2A494E831B2478C30180","accentColor":"1C64AF"},"D9DF24BED6BB0D79B7A1C9ED0043A97B1B995C24":{"name":"Advanced Encryption Package 2025 6.12 - Download for PC Free","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.IA46WkWrAAp36fB0QJWgbwHaFY?pid=Api","datePublished":"2018-06-19T13:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-1.jpg","hostPageUrl":"https://www.malavida.com/en/soft/advanced-encryption-package/","contentSize":"32652 B","width":550,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.200e3a5a45ab000a77e9f0744095a06f?rik=nf1C62270Jd7Gg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"42C599B1B79A3400DE9C1A7B97D0BB6DEB42FD9D","accentColor":"04C728"},"DB40E207108FCDF636AE860C4732A3C96CBC450B":{"name":"Buy Programmable Logic Controller, Super Encryption Stable Connecting ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP._dSfM5pd3JsOfy_1jAp_rQHaHa?pid=Api","datePublished":"2024-05-21T11:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71r1JYgvayL.jpg","hostPageUrl":"https://www.desertcart.in/products/431984067-programmable-logic-controller-super-encryption-stable-connecting-performance-plc-industrial-control-board-for-mitsubishi-fx-2-n-20-mr-programming-bare-board-shell","contentSize":"178483 B","width":1601,"height":1601,"cDNContentUrl":"https://th.bing.com/th/id/R.fdd49f339a5ddc9b0e7f2ff58c0a7fad?rik=vQQucAH43G9j6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B054CBC69C3A2374C068EA636FDCF801702E04BD","accentColor":"736758"},"FC2746B58004E9D7FF5F2EB1F46184B2C6434C14":{"name":"PGP Polytechnic College, Paramathi, Namakkal : Admissions 2025, Courses ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Ja0Eu0e9V_V1L6oXkZViZAAAAA?pid=Api","datePublished":"2022-11-07T01:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.vidyavision.com/CollegeUploads/Photos/2019-07-9-12-32-02_PGP%20Polytechnic%20College.jpg","hostPageUrl":"https://www.vidyavision.com/college/p-g-p-polytechnic-college-paramathi-namakkal-tamilnadu","contentSize":"213346 B","width":350,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.25ad04bb47bd57f5752faa1791956264?rik=z3JkWwhAnn3%2f9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"41C4346C2B48164F1BE2F5FF7D9E40085B6472CF","accentColor":"3F708C"},"F438998DA95C9F17286C4E0E3B0BBC4AF563026F":{"name":"Generate Random Password in Linux - Command Line - Yeah Hub","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.fNvpqRwBzl-CBQ0smrvJPwHaCS?pid=Api","datePublished":"2018-10-19T05:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2018/09/random-password-linux-4.png","hostPageUrl":"https://www.yeahhub.com/generate-random-password-linux-command-line/","contentSize":"24005 B","width":907,"height":280,"cDNContentUrl":"https://th.bing.com/th/id/R.7cdbe9a91c01ce5f82050d2c9abbc93f?rik=T4OZ2JrF%2bXGCxg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F620365FA4CBB0B3E0E4C68271F9C59AD899834F","accentColor":"7E1414"},"EB1D9BE7E698CBAAF7AD227CA975892B013AA522":{"name":"Understanding the potential asphyxiation hazards of gases | A Linde Company","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ZzsggPVCkvKWJYxSKYGaQgHaDE?pid=Api","datePublished":"2024-10-28T13:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://assets.linde.com/-/media/celum-connect/2023/10/16/15/27/linde20gases20cylindersargonimg20100014presscmyk125208.png?impolicy=focal-point&cw=856&ch=354&fx=1500&fy=1063&r=57c30ad7d1","hostPageUrl":"https://www.lindeindia.in/what-we-offer/industrial-gases/gases/health-and-safety/mitigating-asphyxiation-risks","contentSize":"64109 B","width":856,"height":354,"cDNContentUrl":"https://th.bing.com/th/id/R.673b2080f54292f296258c5229819a42?rik=vtG5fm6JvKp%2f2g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"225AA310B298579AC722DA7FAABC896E7EB9D1BE","accentColor":"428E07"},"923376A0DCBA9B686EA2D4C789C95E0D8BB178EF":{"name":"WD Western Digital 1Tb My Passport Portable Ssd, 1050Mb/S R, 1000Mb/S W ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.EU5twi_mlMZ1t-8ZLerXUAAAAA?pid=Api","datePublished":"2020-11-13T17:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41j1FyZho0L._AC_.jpg","hostPageUrl":"https://www.amazon.in/Passport-1050MB-1000MB-Write-Warranty/dp/B08F2G1XPH","contentSize":"13093 B","width":216,"height":390,"cDNContentUrl":"https://th.bing.com/th/id/R.114e6dc22fe694c675b7ef192dead750?rik=KTNnCs2ruYbmKg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FE871BB8D0E59C987C4D2AE686B9ABCD0A673329","accentColor":"6B6064"},"6541EB90447279C9BAB0F2024BACE39EFB2F9D28":{"name":"geocaruso (@geocaruso@mstdn.social) - Mastodon 🐘","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yoytmZD6wFO7fXRLz2t-TAHaFX?pid=Api","datePublished":"2022-11-07T16:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.fosstodon.org/media_attachments/files/110/909/532/938/997/483/original/ff2380ce6adc0256.png","hostPageUrl":"https://mstdn.social/@geocaruso","contentSize":"121342 B","width":813,"height":590,"cDNContentUrl":"https://th.bing.com/th/id/R.ca8cad9990fac053bb7d744bcf6b7e4c?rik=VhS%2bCUQnl5yrCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"82D9F2BFE93ECAB4202F0BAB9C97274409BE1456","accentColor":"032140"},"77E803FC4145E13EFD9D1FBE196BE892F2342379":{"name":"Hunter PGP-04 Ultra Rotor Sprinkler","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.tbHaFuoJRWh8gYlb52kfyAHaHa?pid=Api","datePublished":"2020-04-22T19:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://bahcehavuz.com/f/2020/03/pgp-adj-rotor-sprinkler-dis-mekan-gorseli.jpg","hostPageUrl":"https://bahcehavuz.com/hunter-pgp-04-ultra-rotor-sprinkler/","contentSize":"52232 B","width":600,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.b5b1da16ea0945687c81895be7691fc8?rik=d44wzxRUHuPf2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9732432F298EB691EBF1D9DFE31E5414CF308E77","accentColor":"A5262E"},"2476BE53D0E46FCC167AC9ED0043A97B1B995C24":{"name":"Advanced Encryption Package 2025 6.12 - Download for PC Free","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.C1Em9RDGdX_p_Iw0WB9PmwHaFY?pid=Api","datePublished":"2018-06-19T13:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-3.jpg","hostPageUrl":"https://www.malavida.com/en/soft/advanced-encryption-package/","contentSize":"27190 B","width":550,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.0b5126f510c6757fe9fc8c34581f4f9b?rik=QmfrNQ1O9sxhpw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"42C599B1B79A3400DE9CA761CCF64E0D35EB6742","accentColor":"988833"},"71EA2B87542B55130AF7C9ED0043A97B1B995C24":{"name":"Advanced Encryption Package 2025 6.12 - Download for PC Free","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2SA0F6ldkPmaAVLRx-XCdgHaFY?pid=Api","datePublished":"2018-06-19T13:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-4.jpg","hostPageUrl":"https://www.malavida.com/en/soft/advanced-encryption-package/","contentSize":"31891 B","width":550,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.d9203417a95d90f99a0152d1c7e5c276?rik=F66yeEWyVTGgfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"42C599B1B79A3400DE9C7FA03155B24578B2AE17","accentColor":"938438"},"4DC0DAD05CC2AF3A7D25DD9EF3F691C3CA1518C5":{"name":"Write a program to read two integer values and print true if both the ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.0YjAp83fh_8_jIgv2ZkNfQHaFd?pid=Api","datePublished":"2021-07-17T16:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://hi-static.z-dn.net/files/d24/53722750fc15543b4a6f8bc4e2613bf1.jpg","hostPageUrl":"https://brainly.in/question/43517450","contentSize":"55096 B","width":1047,"height":772,"cDNContentUrl":"https://th.bing.com/th/id/R.d188c0a7cddf87ff3f8c882fd9990d7d?rik=1AytDcUs%2bqPXUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5C8151AC3C196F3FE9DD52D7A3FA2CC50DAD0CD4","accentColor":"A46427"},"F0E3B928299A6FBDFD8B73EE45F006731AF3807E":{"name":"Hunter PGP-ADJ Rotor Sprinkler","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.StkMLztt3yY9fK1heB1KEwHaHa?pid=Api","datePublished":"2020-04-22T19:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://bahcehavuz.com/f/2020/03/pgp-adj-rotor-baslik.jpg","hostPageUrl":"https://bahcehavuz.com/hunter-pgp-adj-rotor-sprinkler/","contentSize":"11286 B","width":600,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.4ad90c2f3b6ddf263d7cad61781d4a13?rik=Dz6bgpKp9tvfuA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E7083FA137600F54EE37B8DFDBF6A992829B3E0F","accentColor":"A32838"},"F1A5BC296A59FC2B1F987D1B14FF70A0D29400D0":{"name":"NICMAR Jan 2023 | Digital Learning Highlights & Updates","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.NW9LC_IH8GpSoPfrkmMd9QHaEK?pid=Api","datePublished":"2023-04-03T09:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.nicmar.ac.in/uploads/Certificate_Collage.jpeg","hostPageUrl":"https://www.nicmar.ac.in/newsletter/jan2023","contentSize":"288800 B","width":800,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.356f4b0bf207f06a52a0f7eb92631df5?rik=H1rLkqaVz7LxiQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0D00492D0A07FF41B1D789F1B2CF95A692CB5A1F","accentColor":"B71421"},"E0060D173F63403AF8DB8F6E3FE07961048E9CA5":{"name":"วิธีปิดการใช้งานการเข้ารหัส BitLocker บน Windows 11 - 8 วิธี","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0O-fAO28AlIjlnOxtNKkRAHaFT?pid=Api","datePublished":"2024-05-20T13:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/recoverit/article/2022/07/disable_windows_11_device_encryption_3.jpg","hostPageUrl":"https://recoverit.wondershare.com/th/harddrive-recovery/how-to-turn-off-bitlocker-windows-11.html","contentSize":"42661 B","width":968,"height":694,"cDNContentUrl":"https://th.bing.com/th/id/R.d0ef9f00edbc0252239673b1b4d2a444?rik=DmDQcfM2BKOPvQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5AC9E84016970EF3E6F8BD8FA30436F371D0600E","accentColor":"B5161B"},"2B8AA840B545F957E42C182CC30EA92A44F585EF":{"name":"Resume Examples for Various Industries | Sample CV Templates","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.tEHxkixmquOX1k1u83jwhAHaKe?pid=Api","datePublished":"2023-09-01T05:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://resumewritingservices.in/api/public/template_images/image_name_1691630712534.jpg","hostPageUrl":"https://resumewritingservices.in/resume/examples","contentSize":"516306 B","width":1653,"height":2339,"cDNContentUrl":"https://th.bing.com/th/id/R.b441f1922c66aae397d64d6ef378f084?rik=sqiKBFtUn3VOwg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FE585F44A29AE03CC281C24E759F545B048AA8B2","accentColor":"042E57"},"5BF966EC8A5C72BCC035555D97CCAF68950A43D4":{"name":"Bearing Lock Nuts R Type | MISUMI | MISUMI India","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.KJSHenxkdYhSUgQRMwD13QHaC-?pid=Api","datePublished":"2021-10-10T16:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://th.misumi-ec.com/en/linked/item/10310432449/img/a210006.jpg","hostPageUrl":"https://in.misumi-ec.com/vona2/detail/110310432449/","contentSize":"102315 B","width":880,"height":353,"cDNContentUrl":"https://th.bing.com/th/id/R.2894877a7c647588525204113300f5dd?rik=tZ9mzqjFJ8sMUw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4D34A05986FACC79D555530CCB27C5A8CE669FB5","accentColor":"BE0A1C"},"5D2A44DF91E72EEC87DE3AE19D7D7074D6049704":{"name":"Indian Institute of Management Ahmedabad (IIMA) - Endowment Fund","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._tsOWJI1auKoULBLrCt6AwAAAA?pid=Api","datePublished":"2022-11-03T20:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.iima.ac.in/sites/default/files/2022-09/Vindi%20Banga.jpg","hostPageUrl":"https://www.iima.ac.in/giving","contentSize":"5842 B","width":256,"height":256,"cDNContentUrl":"https://th.bing.com/th/id/R.fedb0e5892356ae2a850b04bac2b7a03?rik=1aJE%2fRl%2b4s547Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4079406D4707D7D91EA3ED78CEE27E19FD44A2D5","accentColor":"4D7E7E"}},"relatedSearches":[{"text":"PGP Key","displayText":"PGP Key","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Key&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5828.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Key","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Key&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Email Encryption PGP","displayText":"Email Encryption PGP","webSearchUrl":"https://www.bing.com/images/search?q=Email+Encryption+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5830.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Email+Encryption+PGP","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Email+Encryption+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Diagram","displayText":"PGP Encryption Diagram","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5832.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Protocol","displayText":"PGP Protocol","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Protocol&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Protocol","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Protocol&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Icon","displayText":"PGP Encryption Icon","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Icon&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Icon","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP in Cryptography","displayText":"PGP in Cryptography","webSearchUrl":"https://www.bing.com/images/search?q=PGP+in+Cryptography&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+in+Cryptography","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+in+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Key Example","displayText":"PGP Key Example","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Key+Example&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Key+Example","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PGP+Key+Example&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Message","displayText":"PGP Message","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Message&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Message","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Message&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Authentication","displayText":"PGP Authentication","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Authentication&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Authentication","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Authentication&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Email Security","displayText":"PGP Email Security","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Email+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Email+Security","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Email+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Message Format","displayText":"PGP Message Format","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Message+Format&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Message+Format","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Message+Format&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How PGP Works","displayText":"How PGP Works","webSearchUrl":"https://www.bing.com/images/search?q=How+PGP+Works&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+PGP+Works","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=How+PGP+Works&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP File","displayText":"PGP File","webSearchUrl":"https://www.bing.com/images/search?q=PGP+File&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+File","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+File&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Asymmetrical Encryption","displayText":"Asymmetrical Encryption","webSearchUrl":"https://www.bing.com/images/search?q=Asymmetrical+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Asymmetrical+Encryption","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Asymmetrical+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Tool","displayText":"PGP Encryption Tool","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Tool&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Tool","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PGP+Encryption+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Software Free Download","displayText":"PGP Encryption Software Free Download","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Software+Free+Download&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Software+Free+Download","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+Software+Free+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Decrypt","displayText":"PGP Decrypt","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Decrypt&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Decrypt","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PGP+Decrypt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Asymmetric Encryption","displayText":"Asymmetric Encryption","webSearchUrl":"https://www.bing.com/images/search?q=Asymmetric+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Asymmetric+Encryption","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Asymmetric+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Symmetric Key Encryption","displayText":"Symmetric Key Encryption","webSearchUrl":"https://www.bing.com/images/search?q=Symmetric+Key+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Symmetric+Key+Encryption","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Symmetric+Key+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"GPG Encryption","displayText":"GPG Encryption","webSearchUrl":"https://www.bing.com/images/search?q=GPG+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=GPG+Encryption","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=GPG+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP SSL","displayText":"PGP SSL","webSearchUrl":"https://www.bing.com/images/search?q=PGP+SSL&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+SSL","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+SSL&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Public Key Example","displayText":"PGP Public Key Example","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Public+Key+Example&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Public+Key+Example","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Public+Key+Example&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How Does PGP Work","displayText":"How Does PGP Work","webSearchUrl":"https://www.bing.com/images/search?q=How+Does+PGP+Work&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+Does+PGP+Work","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=How+Does+PGP+Work&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP File Sample","displayText":"PGP File Sample","webSearchUrl":"https://www.bing.com/images/search?q=PGP+File+Sample&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+File+Sample","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+File+Sample&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"File Share Encryption Powered by PGP","displayText":"File Share Encryption Powered by PGP","webSearchUrl":"https://www.bing.com/images/search?q=File+Share+Encryption+Powered+by+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=File+Share+Encryption+Powered+by+PGP","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=File+Share+Encryption+Powered+by+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Bash","displayText":"PGP Encryption Bash","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Bash&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Bash","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PGP+Encryption+Bash&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Process","displayText":"PGP Encryption Process","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Process&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Process","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Encryption+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Examples of PGP","displayText":"Examples of PGP","webSearchUrl":"https://www.bing.com/images/search?q=Examples+of+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Examples+of+PGP","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Examples+of+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Benefits","displayText":"PGP Benefits","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Benefits&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Benefits","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Benefits&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Pretty Good Privacy","displayText":"Pretty Good Privacy","webSearchUrl":"https://www.bing.com/images/search?q=Pretty+Good+Privacy&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Pretty+Good+Privacy","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Pretty+Good+Privacy&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Random PGP","displayText":"Random PGP","webSearchUrl":"https://www.bing.com/images/search?q=Random+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Random+PGP","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Random+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encrypt/Decrypt","displayText":"PGP Encrypt/Decrypt","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encrypt%2fDecrypt&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5890.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encrypt%2fDecrypt","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Encrypt%2fDecrypt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption and Decryption","displayText":"PGP Encryption and Decryption","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+and+Decryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5892.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+and+Decryption","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PGP+Encryption+and+Decryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Hybrid Encryption","displayText":"Hybrid Encryption","webSearchUrl":"https://www.bing.com/images/search?q=Hybrid+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5894.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Hybrid+Encryption","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Hybrid+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Server","displayText":"PGP Encryption Server","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Server&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5896.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Server","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+Server&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Definition","displayText":"PGP Definition","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Definition&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5898.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Definition","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Flow","displayText":"PGP Encryption Flow","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Flow&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5900.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Flow","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Encryption+Flow&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Kleopatra PGP","displayText":"Kleopatra PGP","webSearchUrl":"https://www.bing.com/images/search?q=Kleopatra+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5902.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Kleopatra+PGP","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Kleopatra+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Match","displayText":"PGP Encryption Match","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Match&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5904.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Match","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+Match&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Logo","displayText":"PGP Encryption Logo","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Logo&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5906.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Logo","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Sign with PGP","displayText":"Sign with PGP","webSearchUrl":"https://www.bing.com/images/search?q=Sign+with+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5908.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Sign+with+PGP","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Sign+with+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Working of PGP","displayText":"Working of PGP","webSearchUrl":"https://www.bing.com/images/search?q=Working+of+PGP&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5910.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Working+of+PGP","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Working+of+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Passphrase","displayText":"PGP Passphrase","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Passphrase&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5912.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Passphrase","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=PGP+Passphrase&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"GNU Privacy Guard","displayText":"GNU Privacy Guard","webSearchUrl":"https://www.bing.com/images/search?q=GNU+Privacy+Guard&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5914.1","searchLink":"https://www.bing.com/api/v7/images/search?q=GNU+Privacy+Guard","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=GNU+Privacy+Guard&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption 2042","displayText":"PGP Encryption 2042","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+2042&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5916.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+2042","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Encryption+2042&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption in Banking","displayText":"PGP Encryption in Banking","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+in+Banking&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5918.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+in+Banking","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=PGP+Encryption+in+Banking&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Different Encryption Methods","displayText":"Different Encryption Methods","webSearchUrl":"https://www.bing.com/images/search?q=Different+Encryption+Methods&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5920.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Different+Encryption+Methods","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Different+Encryption+Methods&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"AES Encryption","displayText":"AES Encryption","webSearchUrl":"https://www.bing.com/images/search?q=AES+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5922.1","searchLink":"https://www.bing.com/api/v7/images/search?q=AES+Encryption","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=AES+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"SnapLogic PGP Encryption","displayText":"SnapLogic PGP Encryption","webSearchUrl":"https://www.bing.com/images/search?q=SnapLogic+PGP+Encryption&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5924.1","searchLink":"https://www.bing.com/api/v7/images/search?q=SnapLogic+PGP+Encryption","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=SnapLogic+PGP+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PGP Encryption Shirt","displayText":"PGP Encryption Shirt","webSearchUrl":"https://www.bing.com/images/search?q=PGP+Encryption+Shirt&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5926.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Shirt","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=PGP+Encryption+Shirt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1778006783326}
            [curl_error] => 
            [product_name_used] => Pgp-Encryption-Example
            [parsed] => Array
                (
                    [name] => pgp-encryption-example inr loc:in
                    [totalEstimatedMatches] => 171
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [D39E581D5C17F00001E8387E1398917A3423113F] => Array
                                (
                                    [name] => Session-key based encryption. In the modern world, security is the ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.BitPCQ9AOazpbWyg4IvuQwHaDY?pid=Api
                                    [datePublished] => 2022-08-23T21:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/1*YNNHK2av8SqX6mjx_A8_Wg.png
                                    [hostPageUrl] => https://tech.groww.in/session-key-based-encryption-2c223476c3d4
                                    [contentSize] => 322185 B
                                    [width] => 1358
                                    [height] => 620
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.062b4f090f4039ace96d6ca0e08bee43?rik=PemF0cVxDwAQjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F3113243A7198931E7838E10000F71C5D185E93D
                                    [accentColor] => C67905
                                )

                            [5A8353844BBF1EC732263A2F56D313CAEDB4C5C6] => Array
                                (
                                    [name] => Fig : PGP encryption
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.vuLlpBefirYPhFciN5quzQAAAA?pid=Api
                                    [datePublished] => 2022-07-15T02:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://bcognizance.iiita.ac.in/archive/Oct-Dec09/esecure1_clip_image001.gif
                                    [hostPageUrl] => https://bcognizance.iiita.ac.in/archive/Oct-Dec09/esecure1.html
                                    [contentSize] => 8425 B
                                    [width] => 427
                                    [height] => 200
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bee2e5a4179f8ab60f845722379aaecd?rik=pTg1SLT74XwjYg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6C5C4BDEAC313D65F2A362237CE1FBB4483538A5
                                    [accentColor] => 2D2D2D
                                )

                            [E84C0C7CDD993C2A2939ED005B13314695B2B74C] => Array
                                (
                                    [name] => What is Packet Sniffing? What are the ways to Protect against Sniffing?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.-s_t3WOR0vzKbnpprewjkQHaEK?pid=Api
                                    [datePublished] => 2021-11-17T23:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://in.norton.com/content/dam/blogs/images/norton/am/plaintext_privacy.png
                                    [hostPageUrl] => https://in.norton.com/blog/privacy/what-is-packet-sniffing-and-ways-to-protect-against-sniffing
                                    [contentSize] => 53361 B
                                    [width] => 982
                                    [height] => 552
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.facfeddd6391d2fcca6e7a69adec2391?rik=jsTAx92Zw6KSkw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C47B2B59641331B500DE9392A2C399DDC7C0C48E
                                    [accentColor] => 82452F
                                )

                            [AFEF2FF1D439894AC1F8393F2BD361F9D4DD4632] => Array
                                (
                                    [name] => Fully Homomorphic Encryption with Optimal Key Generation Secure Group ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8-MDspuE0jR3IE-vlAHUTwHaGC?pid=Api
                                    [datePublished] => 2023-05-15T07:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-13-06055/article_deploy/html/images/applsci-13-06055-g001-550.jpg
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/13/10/6055
                                    [contentSize] => 98201 B
                                    [width] => 550
                                    [height] => 448
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f3e303b29b84d23477204faf9401d44f?rik=%2bv7yH02TmKQcjw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2364DD4D9F163DB2F3938F1CA498934D1FF2FEFA
                                    [accentColor] => C86603
                                )

                            [0FDB299B54F733C8C6274FD4A1A0771556D5628C] => Array
                                (
                                    [name] => Cryptography : Types of Cryptosystem - Ankit
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.G2FYy6-zHrSzAidg-UmlRAHaF3?pid=Api
                                    [datePublished] => 2017-02-22T06:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ankitjain.info/articles/Cryptography_ankit_files/image006.jpg
                                    [hostPageUrl] => https://ankitjain.info/articles/Cryptography_ankit4.htm
                                    [contentSize] => 26310 B
                                    [width] => 503
                                    [height] => 399
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b6158cbafb31eb4b3022760f949a544?rik=8L2SuUV%2fM4xscg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C8265D6551770A1A4DF4726C8C337F45B992BDF0
                                    [accentColor] => CA01C9
                                )

                            [45D9E2E9AB67C56DBB2B1AE09823D5AB278218FE] => Array
                                (
                                    [name] => How to Decrypt PGP Encrypted files in Databricks – Ization
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.vC9OMEm4ezHdsitzp8IqWQHaDU?pid=Api
                                    [datePublished] => 2021-10-29T02:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ization.in/wp-content/uploads/2021/10/decrypting-pgp-encrypted-files-in-databricks.jpg
                                    [hostPageUrl] => https://ization.in/2021/10/18/how-to-decrypt-pgp-encrypted-files-in-databricks/
                                    [contentSize] => 161394 B
                                    [width] => 1833
                                    [height] => 823
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bc2f4e3049b87b31ddb22b73a7c22a59?rik=VJ0unrp2XNa7sg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EF812872BA5D32890EA1B2BBD65C76BA9E2E9D54
                                    [accentColor] => 32996D
                                )

                            [9F0A13C9D0F50F4A1035FB8A9A3A02E70C9E028D] => Array
                                (
                                    [name] => Зачем нужны криптовалютные кошельки? — Teletype
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5UFYfuDZHwjd2gHavEtORwHaD9?pid=Api
                                    [datePublished] => 2023-04-07T15:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cheapsslsecurity.com/p/wp-content/uploads/2019/08/private-key-encryption.png
                                    [hostPageUrl] => https://teletype.in/@cryptoscamm/wallet_basic
                                    [contentSize] => 22502 B
                                    [width] => 624
                                    [height] => 334
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e541587ee0d91f08ddda01dabc4b4e47?rik=%2baAxnA1f8KQBUw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D820E9C07E20A3A9A8BF5301A4F05F0D9C31A0F9
                                    [accentColor] => BB3810
                                )

                            [9698159D382975390B87437A6F8217527DFA5882] => Array
                                (
                                    [name] => Encryption & Decryption : Information Security ~ I. T. Engg Portal
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.W6dG7juQ6sk3iVsEdY8P-wHaFN?pid=Api
                                    [datePublished] => 2012-02-02T03:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://4.bp.blogspot.com/--6K9yaChFG0/Tu99le284cI/AAAAAAAAAwA/PLTQAivk0fs/s1600/encryption_decryption.gif
                                    [hostPageUrl] => http://www.itportal.in/2011/12/encryption-decryption-information.html
                                    [contentSize] => 29453 B
                                    [width] => 491
                                    [height] => 345
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ba746ee3b90eac937895b04758f0ffb?rik=aYlR2YOSV5OweA&riu=http%3a%2f%2f4.bp.blogspot.com%2f--6K9yaChFG0%2fTu99le284cI%2fAAAAAAAAAwA%2fPLTQAivk0fs%2fs1600%2fencryption_decryption.gif&ehk=0S5OgSUwWUXFque4LWhii1naq2un37u3rcD78v3TcG4%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2885AFD7257128F6A73478B093579283D9518969
                                    [accentColor] => 018ECA
                                )

                            [966CF46BFEAFAA88EE25E46F3AAA432A8677C7D5] => Array
                                (
                                    [name] => What is End-to-End Encryption: E2EE Explained For Beginners | nasscom ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.hpxpaYtzTgGCBuPAHQmqogHaE9?pid=Api
                                    [datePublished] => 2023-06-23T10:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.zeeve.io/wp-content/uploads/2023/06/End-to-end-encryption-01-1-1024x685.jpg
                                    [hostPageUrl] => https://community.nasscom.in/communities/blockchain/what-end-end-encryption-e2ee-explained-beginners
                                    [contentSize] => 58822 B
                                    [width] => 1024
                                    [height] => 685
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.869c69698b734e018206e3c01d09aaa2?rik=acZPtu%2f6qojuUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D7C7768A234AAA3F64E52EE88AAFAEFB64FC669
                                    [accentColor] => 034C65
                                )

                            [F871B2F50DEFF8B324ACCC1CE6D1DF827FC67B9A] => Array
                                (
                                    [name] => The Basics of Keeping Kubernetes Clusters Secure | Trend Micro (IN)
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.W-KVsA3oxObr3Jc9xZ637QAAAA?pid=Api
                                    [datePublished] => 2020-08-28T17:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://documents.trendmicro.com/images/TEx/articles/an-example-of-an-EncryptionConfiguration.jpg
                                    [hostPageUrl] => https://www.trendmicro.com/vinfo/in/security/news/virtualization-and-cloud/the-basics-of-keeping-your-kubernetes-cluster-secure-part-1
                                    [contentSize] => 37226 B
                                    [width] => 400
                                    [height] => 265
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5be295b00de8c4e6ebdc973dc59eb7ed?rik=jxcrX9D%2bjztCyg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A9B76CF728FD1D6EC1CCCA423B8FFED05F2B178F
                                    [accentColor] => 8608C3
                                )

                            [C0BCF1E5DC7B049ECB9A161905A78E21C1B1F937] => Array
                                (
                                    [name] => RSA encryption/decryption C# example
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.i8jjZaIGiEFkQZ-RLQNsdAHaDs?pid=Api
                                    [datePublished] => 2021-11-03T06:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/-ZF5KddnDgBA/YPPzQJxLskI/AAAAAAAAPgM/A8rgwEIpzmQfBGE3jY4KxYF-IqPYxwQVgCLcBGAsYHQ/w1600/rsa.png
                                    [hostPageUrl] => https://www.codeguru.co.in/2021/11/rsa-encryptiondecryption-c-example.html
                                    [contentSize] => 27659 B
                                    [width] => 804
                                    [height] => 401
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8bc8e365a206884164419f912d036c74?rik=DMsfXs23QOm8qQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 739F1B1C12E87A509161A9BCE940B7CD5E1FCB0C
                                    [accentColor] => 4C3299
                                )

                            [BC417D4F228767ECCEBBF252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.GSWvApnoTbuiWqOeHaC5HwAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/7.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 45108 B
                                    [width] => 450
                                    [height] => 383
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1925af0299e84dbba25aa39e1da0b91f?rik=yxTX9CJ4ds7suw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252FBBECCE767822F4D714CB
                                    [accentColor] => A62725
                                )

                            [612B1C184A635A53D4D19DF74DA77CEED5DA84B0] => Array
                                (
                                    [name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bX-gzxfQ0qaudrPs5zwymQHaEj?pid=Api
                                    [datePublished] => 2020-01-21T10:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://acodez.in/wp-content/uploads/2020/01/how-encryption-works-symmetric-encryption.png
                                    [hostPageUrl] => https://acodez.in/data-encryption-algorithms/
                                    [contentSize] => 67377 B
                                    [width] => 664
                                    [height] => 408
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6d7fa0cf17d0d2a6ae76b3ece73c3299?rik=FrLBgaQ2pTVNHQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 0B48AD5DEEC77AD47FD91D4D35A536A481C1B216
                                    [accentColor] => BE550D
                                )

                            [93C38CAB4366807FCF8BF252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ka5o843pFimq-bFOD1QpJwAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/15.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 37892 B
                                    [width] => 350
                                    [height] => 314
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.91ae68f38de91629aaf9b14e0f542927?rik=OTzIujRmCPf8uA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252FB8FCF7086634BAC83C39
                                    [accentColor] => A3282C
                                )

                            [DED2F32CA13F921F995D42E874BC3610869A32AE] => Array
                                (
                                    [name] => A Novel Secure End-to-End IoT Communication Scheme Using Lightweight ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Ctxz9LR23pIGm_2CdbtY4QHaEI?pid=Api
                                    [datePublished] => 2022-09-01T15:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/applsci/applsci-12-08817/article_deploy/html/images/applsci-12-08817-g002.png?1662348680
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/17/8817
                                    [contentSize] => 438575 B
                                    [width] => 3230
                                    [height] => 1805
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0adc73f4b476de92069bfd8275bb58e1?rik=7S0%2fwhrzKfGZ1Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EA23A9680163CB478E24D599F129F31AC23F2DED
                                    [accentColor] => 01B04E
                                )

                            [282519FB2C5655084A95DBDBDF38F99B95CCC5C0] => Array
                                (
                                    [name] => Azure Data Lake Storage Gen2 connection | Adobe Experience Platform
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.cF_uhbHjwZ5VJvL13VPIkQHaCZ?pid=Api
                                    [datePublished] => 2022-11-01T22:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://experienceleague.adobe.com/en/docs/experience-platform/destinations/catalog/cloud-storage/media_13802737cf6dc040fef83a394b10041086cc4e682.png?width=750&format=png&optimize=medium
                                    [hostPageUrl] => https://experienceleague.adobe.com/en/docs/experience-platform/destinations/catalog/cloud-storage/adls-gen2
                                    [contentSize] => 13148 B
                                    [width] => 555
                                    [height] => 180
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.705fee85b1e3c19e5526f2f5dd53c891?rik=glKRv8JlVYCkWQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0C5CCC59B99F83FDBDBD59A4805565C2BF915282
                                    [accentColor] => C1120A
                                )

                            [75C88C4E3016BDE91F39EA5BD63D893CC6B6A930] => Array
                                (
                                    [name] => Beginner Guide of Cryptography (Part 1)
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.95yyxykmqzDYdZqt89OB7AHaGE?pid=Api
                                    [datePublished] => 2016-07-20T21:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/-LTmpkMhwZ8U/V4-yAUdVjuI/AAAAAAAAM4w/IQKelhgOYgAKeM_oimrOd2hG5yGLxbQOACLcB/s1600/10.png
                                    [hostPageUrl] => https://www.hackingarticles.in/beginner-guide-cryptography-part-1/
                                    [contentSize] => 78784 B
                                    [width] => 891
                                    [height] => 730
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f79cb2c72926ab30d8759aadf3d381ec?rik=V4zI5ANh257xkw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 039A6B6CC398D36DB5AE93F19EDB6103E4C88C57
                                    [accentColor] => A26A0C
                                )

                            [1B42E457DC180FA1125C7EAB9355205C6648AC5B] => Array
                                (
                                    [name] => Cryptography : Types of Cryptosystem - Ankit
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP._29P1EesqgUqZo4d9ryiUwHaE9?pid=Api
                                    [datePublished] => 2010-07-25T09:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.ankitjain.info/articles/Cryptography_ankit_files/image004.jpg
                                    [hostPageUrl] => http://www.ankitjain.info/articles/Cryptography_ankit4.htm
                                    [contentSize] => 19535 B
                                    [width] => 506
                                    [height] => 339
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ff6f4fd447acaa052a668e1df6bca253?rik=sSROdc2B8BohxQ&riu=http%3a%2f%2fwww.ankitjain.info%2farticles%2fCryptography_ankit_files%2fimage004.jpg&ehk=abqYM5kZYGrLhBjYOXw5WXzSukDHnsdUrFxtS6CzVow%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B5CA8466C5025539BAE7C5211AF081CD754E24B1
                                    [accentColor] => C30808
                                )

                            [20816F1EAA8AB4EA32BD437A6F8217527DFA5882] => Array
                                (
                                    [name] => Encryption & Decryption : Information Security ~ I. T. Engg Portal
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.n2uuMW6WBS80vAfv-VJZ_QAAAA?pid=Api
                                    [datePublished] => 2012-02-02T03:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://docs.oracle.com/cd/E19575-01/820-2765/images/scrypt.gif
                                    [hostPageUrl] => http://www.itportal.in/2011/12/encryption-decryption-information.html
                                    [contentSize] => 10931 B
                                    [width] => 344
                                    [height] => 131
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9f6bae316e96052f34bc07eff95259fd?rik=Ahj24aqoS64j2w&riu=http%3a%2f%2fdocs.oracle.com%2fcd%2fE19575-01%2f820-2765%2fimages%2fscrypt.gif&ehk=USTd%2fmiVTh00riQrOlVjNP5HPHlItdRo9nKajxVsCnQ%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2885AFD7257128F6A734DB23AE4BA8AAE1F61802
                                    [accentColor] => 436A88
                                )

                            [3BF68392C1F6D81572DDF252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uPb9Xowr12MDbZ5EH0ELGAAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/10.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 44313 B
                                    [width] => 400
                                    [height] => 330
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b8f6fd5e8c2bd763036d9e441f410b18?rik=s284KRxvjVEn3Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252FDD27518D6F1C29386FB3
                                    [accentColor] => C60705
                                )

                            [8B23C0E53746945DCB2A8B5A3B36A87D7D1FC071] => Array
                                (
                                    [name] => Quantum Time Bomb: When Encryption Stops Working
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.WO-3aYZCYPMEsVbpnLKEywHaDe?pid=Api
                                    [datePublished] => 2025-06-08T23:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.securew2.com/wp-content/uploads/2024/01/RSA-Encryption-Works.png
                                    [hostPageUrl] => https://blog.acmvit.in/quantum-timebomb
                                    [contentSize] => 25372 B
                                    [width] => 812
                                    [height] => 381
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.58efb769864260f304b156e99cb284cb?rik=uDIMXnNkSdW8og&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 170CF1D7D78A63B3A5B8A2BCD54964735E0C32B8
                                    [accentColor] => BE850D
                                )

                            [D4AD87A75C08A0CA5A89F252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.TKJ7ze-8nb6YMZoVKibNJwAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/4.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 18827 B
                                    [width] => 400
                                    [height] => 188
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ca27bcdefbc9dbe98319a152a26cd27?rik=Tdp4esWACqylmA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252F98A5AC0A80C57A78DA4D
                                    [accentColor] => C7B604
                                )

                            [57EA617E5CD9F9562D41F252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.gkOduZ4XfCSAto1ezchfgwAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/20.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 17431 B
                                    [width] => 300
                                    [height] => 208
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.82439db99e177c2480b68d5ecdc85f83?rik=da4W58Wdn2XSFA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252F14D2659F9DC5E716AE75
                                    [accentColor] => 036DC8
                                )

                            [947B23F6D3B810D30A5F807CB18CA4D7CA09796F] => Array
                                (
                                    [name] => End-to-End Encryption: What it is and Why it is Needed
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.LOu26BMGPovGvpdlpFMPrwHaDt?pid=Api
                                    [datePublished] => 2019-09-15T21:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blog.etesync.com/content/images/2019/09/without-e2e-1.png
                                    [hostPageUrl] => https://blog.etesync.com/end-to-end-encryption-what-it-is-and-why-it-is-needed/
                                    [contentSize] => 138601 B
                                    [width] => 1024
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2cebb6e813063e8bc6be9765a4530faf?rik=Sbcybz2LAT2g9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F69790AC7D4AC81BC708F5A03D018B3D6F32B749
                                    [accentColor] => CA9901
                                )

                            [0E8096DB9B1A1D7E8B18F802D02F739049A20F1A] => Array
                                (
                                    [name] => Pixrron - Food and Drinks
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.F4bAnNtUPWfxVxsC_I60fAHaDv?pid=Api
                                    [datePublished] => 2020-06-05T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/-OAKVPFtMGWU/Xp56zWF5MRI/AAAAAAAADNU/RGyR5jBOVD4GryZat1T77_-6InPftvb6wCLcBGAsYHQ/s1600/IMPORTANCE%2BOF%2BDATA%2BENCRYPTION.png
                                    [hostPageUrl] => https://www.pixrron.in/2020/03/what-is-data-encryption-encryption.html
                                    [contentSize] => 149838 B
                                    [width] => 1600
                                    [height] => 809
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1786c09cdb543d67f1571b02fc8eb47c?rik=4Ahpvbmh0ee4gQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => A1F02A940937F20D208F81B8E7D1A1B9BD6908E0
                                    [accentColor] => 019E86
                                )

                            [770C287851BC603CE42013B75F9F6A1E34D14FAE] => Array
                                (
                                    [name] => AES encryption for Radio remote Controls
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP._eUzBCMY1eyLCqesAT1dfgHaDv?pid=Api
                                    [datePublished] => 2020-07-21T04:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.anandcontrol.in/dist/assets/img/radio/aes_encryption.jpg
                                    [hostPageUrl] => https://www.anandcontrol.in/blog/aes_encryption_radio_remote_controls.html
                                    [contentSize] => 55128 B
                                    [width] => 1600
                                    [height] => 809
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fde533042318d5ec8b0aa7ac013d5d7e?rik=d8CChxXLBsNOAg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EAF41D43E1A6F9F57B31024EC306CB158782C077
                                    [accentColor] => 0A7EC1
                                )

                            [B542281526BB36CFD9C9C129205B2728E82FD060] => Array
                                (
                                    [name] => PGP NS - UNIT 3 Pretty Good Privacy (PGP) Definition of PGP Encryption ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wMJ7JZj8RDozXXaueec6kAHaJl?pid=Api
                                    [datePublished] => 2024-03-06T09:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/89f1a586b5f527027469823e9e4ef551/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/gandhigram-rural-university/introduction-to-computer/pgp-ns/84782280
                                    [contentSize] => 279936 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c0c27b2598fc443a335d76ae79e73a90?rik=WySCUWK7Y%2fydnA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 060DF28E8272B502921C9C9DFC63BB625182245B
                                    [accentColor] => 474747
                                )

                            [7C98889EDE98F8A0E7DFF252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.T-Ez61yuc7qZpZBY7334HAAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/1.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 39987 B
                                    [width] => 450
                                    [height] => 427
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4fe133eb5cae73ba99a59058ef7df81c?rik=x4mI6e2Jjwp%2b%2fQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252FFD7E0A8F89EDE98889C7
                                    [accentColor] => 1981B2
                                )

                            [41E8E7A224D805596F60F252BC9C3972F176291A] => Array
                                (
                                    [name] => Configuring encryption Jabber + PGP
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.mgVQvULlVzct85I6t7_AEwAAAA?pid=Api
                                    [datePublished] => 2022-04-05T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pkey.in/articles/imgs/1/5.gif
                                    [hostPageUrl] => https://www.pkey.in/tools-ii/articles/configuring-pgp-encryption-jabber
                                    [contentSize] => 21245 B
                                    [width] => 400
                                    [height] => 186
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9a0550bd42e557372df3923ab7bfc013?rik=FI5%2bKkKNUJX2Bg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A192671F2793C9CB252F06F695508D422A7E8E14
                                    [accentColor] => C6B605
                                )

                            [03FAFBC712AC32D59A7411D6BDE3DAEFB4B5EE36] => Array
                                (
                                    [name] => Essential Guide to Symmetric and Asymmetric Encryption in Cryptography
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.B4Cqb2ehpgV3Q1l4EQQ4NQHaDt?pid=Api
                                    [datePublished] => 2023-09-26T09:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.fita.in/wp-content/uploads/2023/09/Symmetric-vs-Asymmetric-Encryption.jpg
                                    [hostPageUrl] => https://www.fita.in/essential-guide-to-symmetric-and-asymmetric-encryption-in-cryptography/
                                    [contentSize] => 115198 B
                                    [width] => 800
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0780aa6f67a1a6057743597811043835?rik=MK%2b%2ffCHKI12pRw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 63EE5B4BFEAD3EDB6D1147A95D23CA217CBFAF30
                                    [accentColor] => 0084A9
                                )

                            [6C035BF1CDAB85BBAC94004A0B60FA752753E84F] => Array
                                (
                                    [name] => Explain PGP trust model - PGP (Pretty Good Privacy) is a popular ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ISOMmEpnTyW8LE5xO9966AAAAA?pid=Api
                                    [datePublished] => 2023-03-02T02:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/bd62b45ec1e23bf334bf76f8d9f945dd/thumb_300_388.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/explain-pgp-trust-model/48730209
                                    [contentSize] => 56086 B
                                    [width] => 300
                                    [height] => 388
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.21238c984a674f25bc2c4e713bdf7ae8?rik=xjC1H9y6WLvKSQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F48E357257AF06B0A40049CABB58BADC1FB530C6
                                    [accentColor] => 41424D
                                )

                            [05D8C6BE9FE064EDD8239DF74DA77CEED5DA84B0] => Array
                                (
                                    [name] => Top 8 Strongest Data Encryption Algorithms in Cryptography
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.AYExbxM6cMs5u-WX3SOyMAHaED?pid=Api
                                    [datePublished] => 2020-01-21T10:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://acodez.in/wp-content/uploads/2020/01/Asymmetric-Encryption.png
                                    [hostPageUrl] => https://acodez.in/data-encryption-algorithms/
                                    [contentSize] => 42338 B
                                    [width] => 796
                                    [height] => 435
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0181316f133a70cb39bbe597dd23b230?rik=UI1s6%2fkORt6NMg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0B48AD5DEEC77AD47FD9328DDE460EF9EB6C8D50
                                    [accentColor] => 264D7F
                                )

                            [95D27CDDC594E2132E858028DBB5CA41E7855C5B] => Array
                                (
                                    [name] => Email Encryption - Competendo - Digital Toolbox
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QdbNRgxwYxuWBylq6jclrAHaF_?pid=Api
                                    [datePublished] => 2019-08-02T07:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://competendo.net/en/images/thumb/b/b3/Pgp1.jpg/600px-Pgp1.jpg
                                    [hostPageUrl] => https://competendo.net/en/Email_Encryption
                                    [contentSize] => 16465 B
                                    [width] => 600
                                    [height] => 485
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.41d6cd460c70631b9607296aea3725ac?rik=WS3H3VxJLjHiWA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B5C5587E14AC5BBD820858E2312E495CDDC72D59
                                    [accentColor] => 30929B
                                )

                            [1AC2D95386F277D0DB128028DBB5CA41E7855C5B] => Array
                                (
                                    [name] => Email Encryption - Competendo - Digital Toolbox
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.h-gQ4U7fTyIr2V1LZCkjRAHaF1?pid=Api
                                    [datePublished] => 2019-08-02T07:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://competendo.net/en/images/thumb/b/b8/Pgp2.jpg/800px-Pgp2.jpg
                                    [hostPageUrl] => https://competendo.net/en/Email_Encryption
                                    [contentSize] => 19228 B
                                    [width] => 800
                                    [height] => 631
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.87e810e14edf4f222bd95d4b64292344?rik=oSydNWgvdw29IQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B5C5587E14AC5BBD820821BD0D772F68359D2CA1
                                    [accentColor] => 30909B
                                )

                            [86D61A425183E7F44C7EE45F50830A9AA712398C] => Array
                                (
                                    [name] => SSH Tutorial: What is SSH, Encryptions and Ports
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.RNTZNhz5kNlQVMZKxyU57wHaEm?pid=Api
                                    [datePublished] => 2017-07-04T04:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2017/07/asymmetric-encryption.jpg
                                    [hostPageUrl] => https://www.hostinger.in/tutorials/ssh-tutorial-how-does-ssh-work
                                    [contentSize] => 39122 B
                                    [width] => 900
                                    [height] => 560
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.44d4d9361cf990d95054c64ac72539ef?rik=aG2hJBU4fk%2fE5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C893217AA9A03805F54EE7C44F7E381524A16D68
                                    [accentColor] => AB2030
                                )

                            [8D8CF0C550D2175FD7348028DBB5CA41E7855C5B] => Array
                                (
                                    [name] => Email Encryption - Competendo - Digital Toolbox
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.VINbw6iBkwYnDn7SaiNa0QHaCv?pid=Api
                                    [datePublished] => 2019-08-02T07:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://competendo.net/en/images/thumb/f/f8/Pgp4.jpg/500px-Pgp4.jpg
                                    [hostPageUrl] => https://competendo.net/en/Email_Encryption
                                    [contentSize] => 9824 B
                                    [width] => 500
                                    [height] => 185
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.54835bc3a8819306270e7ed26a235ad1?rik=2MgPXAUtcfV9Qw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B5C5587E14AC5BBD8208437DF5712D055C0FC8D8
                                    [accentColor] => 30929B
                                )

                            [9AA4EC27B80187333B8B290F08E902C1BBEDE8E8] => Array
                                (
                                    [name] => Encrypt File | IntelliBuddies® Documentation Portal
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.sn18FlOv-WrmGomwzW9MkwAAAA?pid=Api
                                    [datePublished] => 2025-03-04T05:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://docs.intellibuddies.com/assets/images/img-encrypt-decrypt-file-example-beec4700bbed1b25cde593c72ef22e52.png
                                    [hostPageUrl] => https://docs.intellibuddies.com/docs/activities/encrypt-file/
                                    [contentSize] => 50390 B
                                    [width] => 407
                                    [height] => 1124
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b27d7c1653aff96ae61a89b0cd6f4c93?rik=qUrOcosQeDOzuA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8E8EDEBB1C209E80F092B8B33378108B72CE4AA9
                                    [accentColor] => 914708
                                )

                            [97906DBED731EA74CFF6A57EBFBD7C0220CFD19F] => Array
                                (
                                    [name] => Symmetric and asymmetric encryptions
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.58doCDbQwNHjd81lv9aJQwHaEK?pid=Api
                                    [datePublished] => 2023-08-13T14:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.hashnode.com/res/hashnode/image/upload/v1690978571340/e3e0b779-b5e1-48ef-9f62-0062fc14c329.png
                                    [hostPageUrl] => https://blog.tdevs.in/symmetric-and-asymmetric-encryption-40a1f1c1530f
                                    [contentSize] => 98564 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e7c7680836d0c0d1e377cd65bfd68943?rik=eQnW630Trkf8bw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F91DFC0220C7DBFBE75A6FFC47AE137DEBD60979
                                    [accentColor] => 101726
                                )

                            [D44DBD13EF65893D3B3F11D6BDE3DAEFB4B5EE36] => Array
                                (
                                    [name] => Essential Guide to Symmetric and Asymmetric Encryption in Cryptography
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.t5e0pTs8cwF7DbMEZc_hoAHaDL?pid=Api
                                    [datePublished] => 2023-09-26T09:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.fita.in/wp-content/uploads/2023/09/Types-of-Encryption-Systems.jpg
                                    [hostPageUrl] => https://www.fita.in/essential-guide-to-symmetric-and-asymmetric-encryption-in-cryptography/
                                    [contentSize] => 96931 B
                                    [width] => 700
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b797b4a53b3c73017b0db30465cfe1a0?rik=TdTbMf5WmNOz8w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 63EE5B4BFEAD3EDB6D11F3B3D39856FE31DBD44D
                                    [accentColor] => CB002C
                                )

                            [BF09793CC9184504B726665650473793AF4A90D3] => Array
                                (
                                    [name] => Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bitO8dIDuFxhfwyIyDLIpgHaCX?pid=Api
                                    [datePublished] => 2023-05-09T13:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-23-04594/article_deploy/html/images/sensors-23-04594-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/23/10/4594
                                    [contentSize] => 70736 B
                                    [width] => 2840
                                    [height] => 910
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6e2b4ef1d203b85c617f0c88c832c8a6?rik=%2b5CXw5yBVEB7Yg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3D09A4FA397374056566627B4054819CC39790FB
                                    [accentColor] => BD0E22
                                )

                            [1F6231A36E8656C629D54EA0252F8D959D2C7301] => Array
                                (
                                    [name] => How do I secure/protect my wireless network by using WEP encryption on ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ij5lWcJoLJEmAe4l8ZRfMgHaDy?pid=Api
                                    [datePublished] => 2015-07-30T10:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.tp-link.com/resources/images/faq/201052195638294.jpg
                                    [hostPageUrl] => https://www.tp-link.com/in/support/faq/257/
                                    [contentSize] => 23375 B
                                    [width] => 575
                                    [height] => 294
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8a3e6559c2682c912601ee25f1945f32?rik=8SYTOuZoZWySXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1037C2D959D8F2520AE45D926C6568E63A1326F1
                                    [accentColor] => BC130F
                                )

                            [FCFAFD8E02FD64F8F271DC2126D50A6D9224A0EC] => Array
                                (
                                    [name] => Data Encryption: Securing Data at Rest and in Transit with Encryption ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-GqxMZOg_LFf1HkF6pS47AHaEe?pid=Api
                                    [datePublished] => 2023-08-19T07:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://dev-to-uploads.s3.amazonaws.com/uploads/articles/7op5bapw3acdlst15ez2.png
                                    [hostPageUrl] => https://j471n.in/blogs/data-encryption-securing-data-at-rest-and-in-transit-with-encryption-technologies
                                    [contentSize] => 564571 B
                                    [width] => 2000
                                    [height] => 1210
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f86ab13193a0fcb15fd47905ea94b8ec?rik=z6%2ff6CDfRo8vFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CE0A4229D6A05D6212CD172F8F46DF20E8DFAFCF
                                    [accentColor] => 12A23E
                                )

                            [DA3F7494940AF2D2D2EA4912ECF6A9DD7BED5339] => Array
                                (
                                    [name] => What Is TLS (Transport Layer Security) And How It Works
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.NU19tt9whB9pGm2Ng24VPwHaFU?pid=Api
                                    [datePublished] => 2022-09-09T14:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hostinger.in/tutorials/wp-content/uploads/sites/2/2022/09/image1.png
                                    [hostPageUrl] => https://www.hostinger.in/tutorials/what-is-tls
                                    [contentSize] => 38787 B
                                    [width] => 1601
                                    [height] => 1149
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.354d7db6df70841f691a6d8d836e153f?rik=rfNHSUmgLy0trg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9335DEB7DD9A6FCE2194AE2D2D2FA0494947F3AD
                                    [accentColor] => 0434C7
                                )

                            [A09479D47BB894BFD87F549F17C47698908057DF] => Array
                                (
                                    [name] => WannaCry Ransomware Inaunda Havoc Ulimwenguni Pote kwa Kutumia ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iXM0pod_Ywnuur3wHfmnNgHaD_?pid=Api
                                    [datePublished] => 2025-09-08T17:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.seqrite.com/blog/wp-content/uploads/2017/05/WannaCryRansomwareEncryptedfiles.png
                                    [hostPageUrl] => https://www.seqrite.com/sw/blog/wannacry-ransomware-creating-havoc-worldwide-by-exploiting-patched-windows-exploit/
                                    [contentSize] => 141213 B
                                    [width] => 515
                                    [height] => 278
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.897334a6877f6309eebabdf01df9a736?rik=CkmXTbeLSfuN9w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FD75080989674C71F945F78DFB498BB74D97490A
                                    [accentColor] => AE1D23
                                )

                            [A9F37E8080BE7DC74EA4692E4AAF97A0AE84200A] => Array
                                (
                                    [name] => Caesar cipher encryption and decryption python code solution ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.PPQ43F6kfoD-MfM9jMn0nQHaEK?pid=Api
                                    [datePublished] => 2023-02-04T08:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.innovativecodesacademy.in/wp-content/uploads/2022/01/Caesar-cipher-encryption-1536x864.png
                                    [hostPageUrl] => http://www.innovativecodesacademy.in/caesar-cipher-encryption-and-decryption-python-code-solution/
                                    [contentSize] => 107771 B
                                    [width] => 1536
                                    [height] => 864
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3cf438dc5ea47e80fe31f33d8cc9f49d?rik=mj%2fnCAjr13zkSg&riu=http%3a%2f%2fwww.innovativecodesacademy.in%2fwp-content%2fuploads%2f2022%2f01%2fCaesar-cipher-encryption-1536x864.png&ehk=DJZVlsSl%2bVqhf6i7lmb5CbFVqd7kBN4OibuRcZ149gk%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A00248EA0A79FAA4E2964AE47CD7EB0808E73F9A
                                    [accentColor] => B95812
                                )

                            [38D78CF4A79AB0D9B3B43206BF82305516EE5A0E] => Array
                                (
                                    [name] => What are the five principal services provided by PGP - This ensures ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.str1GhQnWxe6i-VmNMl_VAHaJl?pid=Api
                                    [datePublished] => 2023-03-02T02:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/cafbc97f42599d6042610165376111e5/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-are-the-five-principal-services-provided-by-pgp/48730654
                                    [contentSize] => 159021 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b2daf51a14275b17ba8be56634c97f54?rik=g33IT3qpC507Sw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E0A5EE61550328FB60234B3B9D0BA97A4FC87D83
                                    [accentColor] => 424242
                                )

                            [084084E947E2743DD76B6AD6E1F11B1E812C1390] => Array
                                (
                                    [name] => AES based encrypt and decrypt text in Python | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Ya1A8ElWnRDCg0pkEsdn3AHaET?pid=Api
                                    [datePublished] => 2021-08-29T00:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/source-code/python-programming-sample/s44a.png
                                    [hostPageUrl] => https://slogix.in/source-code/python/programming-samples/how-to-encrypt-and-decrypt-text-using-aes-in-python/
                                    [contentSize] => 42601 B
                                    [width] => 549
                                    [height] => 319
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.61ad40f049569d10c2834a6412c767dc?rik=gARInnQuR9N9tg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0931C218E1B11F1E6DA6B67DD3472E749E480480
                                    [accentColor] => 369734
                                )

                            [BE02A6B023FBBFAFBEF8B81A51422126BCB53E37] => Array
                                (
                                    [name] => Types et méthodes de chiffrement des données : une introduction | Splunk
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.SdvR47ktRyvY0JgWjX1xbwHaFK?pid=Api
                                    [datePublished] => 2025-05-10T03:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.splunk.com/content/dam/splunk-blogs/images/en_us/2023/02/triple-des2.png
                                    [hostPageUrl] => https://www.splunk.com/fr_fr/blog/learn/data-encryption-methods-types.html
                                    [contentSize] => 17218 B
                                    [width] => 602
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.49dbd1e3b92d472bd8d098168d7d716f?rik=6yBqCzK%2f%2b%2frrjw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 73E35BCB62122415A18B8FEBFAFBBF320B6A20EB
                                    [accentColor] => 666666
                                )

                            [85E478B4DC5F29C1169DA21DABA90D85A66D020C] => Array
                                (
                                    [name] => An Efficient Encryption Algorithm for the Security of Sensitive Private ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.xWSbLS1NxnBoazwx5g2N8gHaJo?pid=Api
                                    [datePublished] => 2019-10-25T09:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-08-01220/article_deploy/html/images/electronics-08-01220-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/8/11/1220
                                    [contentSize] => 101633 B
                                    [width] => 1983
                                    [height] => 2578
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c5649b2d2d4dc670686b3c31e60d8df2?rik=WE6HS831khxh2Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C020D66A58D09ABAD12AD9611C92F5CD4B874E58
                                    [accentColor] => 3B3B3B
                                )

                            [A08796C755B52CE8D2D6D19ACB01E072996976E2] => Array
                                (
                                    [name] => What is Data Encryption?
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.RTJ1myfJYUHUcMOBuX_UkAHaEL?pid=Api
                                    [datePublished] => 2017-08-17T07:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.co.in/content/en-in/images/repository/isc/2021/encryption-1.jpg
                                    [hostPageUrl] => https://www.kaspersky.co.in/resource-center/definitions/encryption
                                    [contentSize] => 124545 B
                                    [width] => 710
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4532759b27c96141d470c381b97fd490?rik=CnhpfFVbwo4tbQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2E679699270E10BCA91D6D2D8EC25B557C69780A
                                    [accentColor] => 1E8FAD
                                )

                            [EDBEAFD55AACF97B40E90CE5B24D85CF40F7F79C] => Array
                                (
                                    [name] => Modified Advanced Encryption Standard Algorithm for Information Security
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.BHw0C_jDKfpVc0PkxQUX6wHaH0?pid=Api
                                    [datePublished] => 2019-12-05T09:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/symmetry/symmetry-11-01484/article_deploy/html/images/symmetry-11-01484-g001.png?1577852041
                                    [hostPageUrl] => https://www.mdpi.com/2073-8994/11/12/1484
                                    [contentSize] => 325910 B
                                    [width] => 1915
                                    [height] => 2024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.047c340bf8c329fa557343e4c50517eb?rik=3uv6XaXKn7cEng&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C97F7F04FC58D42B5EC09E04B79FCAA55DFAEBDE
                                    [accentColor] => 776954
                                )

                            [DC1B2BD5CF21E6B7E4ABE840F7E705BA7D3F8990] => Array
                                (
                                    [name] => How to Encrypt and Decrypt Text Online - Comprehensive Guide
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.y5veYRrxIwT7MPKOxkraOwHaC3?pid=Api
                                    [datePublished] => 2024-06-10T17:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://converttools.app/Scripts/img/endetext3.PNG
                                    [hostPageUrl] => https://converttools.app/blog/how-to-encrypt-and-decrypt-text
                                    [contentSize] => 17662 B
                                    [width] => 1237
                                    [height] => 480
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cb9bde611af12304fb30f28ec64ada3b?rik=zbGyXfwSbntOug&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0998F3D7AB507E7F048EBA4E7B6E12FC5DB2B1CD
                                    [accentColor] => 0639C5
                                )

                            [0DFA212B9455B18EB002C8B23A9125186B97A68D] => Array
                                (
                                    [name] => A Lightweight Image Encryption Algorithm Based on Chaotic Map and ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.wKpFpMKL9ao24XFLqqdNFQHaId?pid=Api
                                    [datePublished] => 2022-09-23T13:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/entropy/entropy-24-01344/article_deploy/html/images/entropy-24-01344-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1099-4300/24/10/1344
                                    [contentSize] => 72245 B
                                    [width] => 1906
                                    [height] => 2176
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c0aa45a4c28bf5aa36e1714baaa74d15?rik=0K8SsklVG%2bgLIA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D86A79B6815219A32B8C200BE81B5549B212AFD0
                                    [accentColor] => 454545
                                )

                            [54A97EE6D8ECD3DF540778D25959CF1E1F0C2890] => Array
                                (
                                    [name] => OpenGL Projects: Encryption Decryption Computer Graphics Projects
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.2MCx6Dfo5uzm4tdg-h8DGAHaFc?pid=Api
                                    [datePublished] => 2018-04-03T21:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI2Om6_aoLRdLdGoPNLQbh4kNdToe2v2C8WSZApbu1GUXzQofgYcHLAnYgGyjjr1jvQ86YMNgap6ZDTrUyyhSyUL48BQ0Yy3WmxJyzPUyS2optdPm-kTvEvirpUdWvHPxH5c6syKCtZNza/s1600/encryption+decryption+computer+graphics+projects.png
                                    [hostPageUrl] => https://www.openglprojects.in/2014/03/encryption-decryption-computer-graphics.html
                                    [contentSize] => 8730 B
                                    [width] => 1015
                                    [height] => 746
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d8c0b1e837e8e6ece6e2d760fa1f0318?rik=RZrnbo3OPf1FcA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0982C0F1E1FC95952D877045FD3DCE8D6EE79A45
                                    [accentColor] => 7A7B02
                                )

                            [495E4BD0B7F14324D142E840F7E705BA7D3F8990] => Array
                                (
                                    [name] => How to Encrypt and Decrypt Text Online - Comprehensive Guide
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.e0rWAXy_KyAKHD20DWgPcwHaCt?pid=Api
                                    [datePublished] => 2024-06-10T17:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://converttools.app/Scripts/img/endetext2.PNG
                                    [hostPageUrl] => https://converttools.app/blog/how-to-encrypt-and-decrypt-text
                                    [contentSize] => 16150 B
                                    [width] => 1209
                                    [height] => 443
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7b4ad6017cbf2b200a1c3db40d680f73?rik=lOW0DXsfNEIdJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0998F3D7AB507E7F048E241D42341F7B0DB4E594
                                    [accentColor] => 0538C6
                                )

                            [7069DCBE602AE64C48DEB32ECA0A51B1C777DA2F] => Array
                                (
                                    [name] => E PGP B2 program manual - Sample example for exam use use it wisely ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.6YRapoiuoad0zk6gVhsmQgHaKd?pid=Api
                                    [datePublished] => 2022-07-30T02:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/5f59c3402434de08b8bd705fe1a808f1/thumb_1200_1696.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/indian-institute-of-management-raipur/executive-mba/e-pgp-b2-program-manual-sample-example-for-exam-use-use-it-wisely/29173002
                                    [contentSize] => 926892 B
                                    [width] => 1200
                                    [height] => 1696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9845aa688aea1a774ce4ea0561b2642?rik=B5bN6waibsSE7Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F2AD777C1B15A0ACE23BED84C46EA206EBCD9607
                                    [accentColor] => 24376A
                                )

                            [B47C3665C3DD6D9D3E91C45764F239721158F550] => Array
                                (
                                    [name] => Q11Key - RSA Encryption Algorithm Overview and Example - Studocu
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.MDMZbzGJerg7ilEP5-30_AHaEK?pid=Api
                                    [datePublished] => 2025-12-03T01:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/08944cc30644f3ea0deaf396bf39a667/thumb_784_441.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jntua-college-of-engineering-anantapuram/bachelor-of-technology/q11key-rsa-encryption-algorithm-overview-and-example/147436153
                                    [contentSize] => 94502 B
                                    [width] => 784
                                    [height] => 441
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3033196f31897ab83b8a510fe7edf4fc?rik=S8djVjzd1tnjGQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 055F851127932F46754C19E3D9D6DD3C5663C74B
                                    [accentColor] => 626569
                                )

                            [2FC214027F5D04B27CB0E46F3AAA432A8677C7D5] => Array
                                (
                                    [name] => What is End-to-End Encryption: E2EE Explained For Beginners | nasscom ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.owatA3qzuCOvIJD3TVoDnQHaG6?pid=Api
                                    [datePublished] => 2023-06-23T10:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.zeeve.io/wp-content/uploads/2023/06/End-to-end-encryption-02-2048x1914.jpg
                                    [hostPageUrl] => https://community.nasscom.in/communities/blockchain/what-end-end-encryption-e2ee-explained-beginners
                                    [contentSize] => 277640 B
                                    [width] => 2048
                                    [height] => 1914
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a306ad037ab3b823af2090f74d5a039d?rik=8ixBIPfVQCvHCw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D7C7768A234AAA3F64E0BC72B40D5F720412CF2
                                    [accentColor] => 004C69
                                )

                            [8987BE014BEEDC68F826E840F7E705BA7D3F8990] => Array
                                (
                                    [name] => How to Encrypt and Decrypt Text Online - Comprehensive Guide
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iVOLZjnlI69ne6TDAnBJJwHaB4?pid=Api
                                    [datePublished] => 2024-06-10T17:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://converttools.app/Scripts/img/endetext4.PNG
                                    [hostPageUrl] => https://converttools.app/blog/how-to-encrypt-and-decrypt-text
                                    [contentSize] => 6387 B
                                    [width] => 1229
                                    [height] => 312
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.89538b6639e523af677ba4c302704927?rik=mHjrELTuzYaPYg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0998F3D7AB507E7F048E628F86CDEEB410EB7898
                                    [accentColor] => 6A6661
                                )

                            [68BD5E69C312440BAD5938709486CECB297A580F] => Array
                                (
                                    [name] => PGP College Of Arts & Science
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.WbFdT2rrlNGdYRrePL7LpAHaHE?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pgpartscollege.ac.in/images/about/home7.jpg
                                    [hostPageUrl] => https://www.pgpartscollege.ac.in/
                                    [contentSize] => 117560 B
                                    [width] => 650
                                    [height] => 620
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.59b15d4f6aeb94d19d611ade3cbecba4?rik=htvlljwhRLDalQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F085A792BCEC6849078395DAB044213C96E5DB86
                                    [accentColor] => C71B04
                                )

                            [FEF68C5FAAF610DCD4546B0DE5357AFCB6BC27B1] => Array
                                (
                                    [name] => How to Encrypt and Decrypt Connection Strings in Web.Config File
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7g7WTeO6jUfd1H-Tn6G1-wHaDJ?pid=Api
                                    [datePublished] => 2017-12-13T08:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.encodedna.com/aspdotnet/encrypted-webconfig-connection-string.png
                                    [hostPageUrl] => https://www.encodedna.com/aspdotnet/encrypt-and-decrypt-connection-strings-in-webconfig-visual-studio-2010.htm
                                    [contentSize] => 12247 B
                                    [width] => 752
                                    [height] => 320
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ee0ed64de3ba8d47ddd47f939fa1b5fb?rik=72%2fI9apvAc1NRQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1B72CB6BCFA7535ED0B6454DCD016FAAF5C86FEF
                                    [accentColor] => 0E00CC
                                )

                            [71C7E75DDB5C47178190CB058C4EDD295A159B46] => Array
                                (
                                    [name] => IIMA - One-Year Full Time PGP in Management for Executives (MBA-PGPX)
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.G8Db25QsMwdQQEmQwyUXEwHaHa?pid=Api
                                    [datePublished] => 2022-11-03T20:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.iima.ac.in/sites/default/files/2023-09/111.jpg
                                    [hostPageUrl] => https://www.iima.ac.in/academics/MBA-PGPX
                                    [contentSize] => 947706 B
                                    [width] => 2554
                                    [height] => 2554
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1bc0dbdb942c330750404990c3251713?rik=F3x%2b1b3FdHEYCQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 64B951A592DDE4C850BC09187174C5BDD57E7C17
                                    [accentColor] => BF8D0C
                                )

                            [F54311C951797B82A502630B002E580952EB40F3] => Array
                                (
                                    [name] => PGP Student Portal
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5S2D-63froZ_COK_3zMulQAAAA?pid=Api
                                    [datePublished] => 2021-10-29T09:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ltp.iima.ac.in/pgp/grades/user/assets/img/logo.png
                                    [hostPageUrl] => https://ltp.iima.ac.in/pgp/grades/user/index.php
                                    [contentSize] => 11731 B
                                    [width] => 150
                                    [height] => 163
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e52d83fbaddfae867f08e2bfdf332e95?rik=XzQRnBWXtyhaIA&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 3F04BE259085E200B036205A28B797159C11345F
                                    [accentColor] => 666666
                                )

                            [CE209E54197B19005F10235B5E90FC225FAAE8CA] => Array
                                (
                                    [name] => AES Encryption and Decryption in PHP See example | Web Technology ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.AxX0gNds3juOnwEKCvVZuAAAAA?pid=Api
                                    [datePublished] => 2018-01-13T14:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsyM1_CNbdBcIfkR-RYyjV9IXEntlnBaNPt7BLfhsv2igH5OUm77XMr2iMIu2dzzs2lzbsZlrhBlCueEjl0fnugRfDZggXN1zhAJ9DvOL0ItJAi2m9btJZ_tACnpNsuTSCvLKSxZE9CplD/w1200-h630-p-k-no-nu/AES+Encryption+and+Decryption+in+PHP+See+example.png
                                    [hostPageUrl] => https://www.web-technology-experts-notes.in/2016/03/aes-encryption-and-decryption-in-php-view-example.html
                                    [contentSize] => 24497 B
                                    [width] => 469
                                    [height] => 246
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0315f480d76cde3b8e9f010a0af559b8?rik=7ALpRZG3kQD1AQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AC8EAAF522CF09E5B53201F50091B79145E902EC
                                    [accentColor] => 6C401B
                                )

                            [17732398F3B2C0A766D5AF58CAEA6A437472BC97] => Array
                                (
                                    [name] => PGP College of Engineering and Technology
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.xQnQfHtXSWBMplPw6GDvQAHaCA?pid=Api
                                    [datePublished] => 2020-04-11T10:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pgpcet.ac.in/images/pgp_images/placement3.jpg
                                    [hostPageUrl] => https://pgpcet.ac.in/
                                    [contentSize] => 307719 B
                                    [width] => 1050
                                    [height] => 285
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c509d07c7b5749604ca653f0e860ef40?rik=cTcyiT8rDHpmXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 79CB274734A6AEAC85FA5D667A0C2B3F89323771
                                    [accentColor] => BE990D
                                )

                            [3F992E9AA5F2E6E2BAF3ACACB3457140BD836FEB] => Array
                                (
                                    [name] => Our Gallery
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.6b09opvVwd_eRCZrNF0OUgHaDy?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgpnursing.edu.in/overall_gallery_images/OVERALL_GALLERY_2023-09-04%2010_34_18_1.png
                                    [hostPageUrl] => https://pgpnursing.edu.in/
                                    [contentSize] => 143956 B
                                    [width] => 1519
                                    [height] => 777
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9bd3da29bd5c1dfde44266b345d0e52?rik=85niqVovbi6rPw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => BEF638DB0417543BCACA3FAB2E6E2F5AA9E299F3
                                    [accentColor] => 604C49
                                )

                            [C5FC3543D3C5AF5AD1CF750FF4F54EB1FA5A7769] => Array
                                (
                                    [name] => What is Elliptic Curve Cryptography (ECC) Discuss ECC algorithm with ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.y0ENmn-Bw1byCD0t1brCWAHaJl?pid=Api
                                    [datePublished] => 2023-03-02T02:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fab92a17457959c344d7273f210a4b31/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jain-deemed-to-be-university/information-security/what-is-elliptic-curve-cryptography-ecc-discuss-ecc-algorithm-with-neat-diagram/48980482
                                    [contentSize] => 175643 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cb410d9a7f81c356f2083d2dd5bac258?rik=XM9TND1c%2bqUd%2fA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9677A5AF1BE45F4FF057FC1DA5FA5C3D3453CF5C
                                    [accentColor] => C93102
                                )

                            [A164F99E958092061DA78219DA004078BFECFB00] => Array
                                (
                                    [name] => PGP College of Engineering and Technology
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZOuy-wyGEjmEjRxtzbODsQHaCA?pid=Api
                                    [datePublished] => 2014-02-03T04:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://pgpcet.ac.in/images/pgp_images/pgp.jpg
                                    [hostPageUrl] => http://www.pgpcet.ac.in/
                                    [contentSize] => 101314 B
                                    [width] => 1400
                                    [height] => 380
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.64ebb2fb0c861239848d1c6dcdb383b1?rik=Gkaf6VkIKWDReg&riu=http%3a%2f%2fpgpcet.ac.in%2fimages%2fpgp_images%2fpgp.jpg&ehk=%2bbJXpOnh43GcW2gIMh16VbNHmhe3ZK1rERb%2b%2fBQlKcc%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 00BFCEFB870400AD91287AD160290859E99F461A
                                    [accentColor] => 986334
                                )

                            [2B168FE3FC89BE882F3DD2A3591B21A6038832C8] => Array
                                (
                                    [name] => Virtual Labs
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.uGjreDAA_6RnqrsNLYLFsgHaFl?pid=Api
                                    [datePublished] => 2021-08-26T22:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/images/image2.png
                                    [hostPageUrl] => https://cse29-iiith.vlabs.ac.in/exp/substitution-cipher/theory.html
                                    [contentSize] => 60474 B
                                    [width] => 663
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b868eb783000ffa467aabb0d2d82c5b2?rik=smH4Ps%2bY64jy0w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8C2388306A12B1953A2DD3F288EB98CF3EF861B2
                                    [accentColor] => 296AA2
                                )

                            [F3FC486EC82A459CB4FAC4646DD6B97B4F0A9422] => Array
                                (
                                    [name] => A closer look at the MU Online packet encryption
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Bv0KLI1YW8SxxTR13VSQ1AAAAA?pid=Api
                                    [datePublished] => 2017-12-22T08:01:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://munique.net/content/images/2018/09/key.PNG
                                    [hostPageUrl] => https://munique.net/a-closer-look-at-the-mu-online-packet-encryption/
                                    [contentSize] => 4736 B
                                    [width] => 455
                                    [height] => 84
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.06fd0a2c8d585bc4b1c53475dd5490d4?rik=P8%2bE5oyiVMlLrw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2249A0F4B79B6DD6464CAF4BC954A28CE684CF3F
                                    [accentColor] => 036FC8
                                )

                            [F31AF08BEF03EC3F69B905B5D7438536DF4E0EF6] => Array
                                (
                                    [name] => PGP College of Pharmaceutical Science and Research Institute Namakkal ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.pnokxShtgxwo4oAqpLCI-QHaD7?pid=Api
                                    [datePublished] => 2024-08-20T09:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.collegebatch.com/static/clg-gallery/pgp-college-of-pharmaceutical-science-and-research-institute-namakkal-111759.png
                                    [hostPageUrl] => https://www.collegebatch.com/11183-pgp-college-of-pharmaceutical-science-and-research-institute-campus-tour-namakkal
                                    [contentSize] => 30284 B
                                    [width] => 500
                                    [height] => 265
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a67a24c5286d831c28e2802aa4b088f9?rik=P6EPuP4wzvOWmw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6FE0E4FD6358347D5B509B96F3CE30FEB80FA13F
                                    [accentColor] => 505B14
                                )

                            [B01CBCC9EC953BFC5FAE0BCF480E144FF2D902EE] => Array
                                (
                                    [name] => Verify Hash | IntelliBuddies® Documentation Portal
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.uq0tNvw43IlEgUuWtGoBLAAAAA?pid=Api
                                    [datePublished] => 2025-01-18T18:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://docs.intellibuddies.com/assets/images/img-hash-verify-text-example-7eda7be7cb16a3c81f8ffe94ed0013b3.png
                                    [hostPageUrl] => https://docs.intellibuddies.com/docs/activities/verify-hash/
                                    [contentSize] => 18378 B
                                    [width] => 352
                                    [height] => 553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.baad2d36fc38dc8944814b96b46a012c?rik=C8HLnM5Zs8%2f16g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EE209D2FF441E084FCB0EAF5CFB359CE9CCBC10B
                                    [accentColor] => BF920C
                                )

                            [30A3B81C4BB8AD1F41D23D6786DAC6C41267742E] => Array
                                (
                                    [name] => Full Disk Encryption | Devuan GNU+Linux Free Operating System
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.FbRwPSwV8iwCRSqPYChykAHaFj?pid=Api
                                    [datePublished] => 2020-06-10T04:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/img/encrypt1.png
                                    [hostPageUrl] => https://www.devuan.org/os/documentation/install-guides/beowulf/full-disk-encryption
                                    [contentSize] => 7545 B
                                    [width] => 640
                                    [height] => 480
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.15b4703d2c15f22c02452a8f60287290?rik=AzqLwbSL2vEULQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E24776214C6CAD6876D32D14F1DA8BB4C18B3A03
                                    [accentColor] => 0000A9
                                )

                            [AD7FD0EE25A0EADA241CFDF6243F2DDAAD310CE0] => Array
                                (
                                    [name] => ISB PGP PRO: Executive MBA for Working Professionals
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.k4AULKinphhJ8403YxPCygHaFj?pid=Api
                                    [datePublished] => 2020-07-19T12:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2Fvnzpvpd4%2Fapply-now-pgp-pro-2.jpg%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75
                                    [hostPageUrl] => https://www.isb.edu/programmes/post-graduate-programmes/pgp-pro
                                    [contentSize] => 122431 B
                                    [width] => 1920
                                    [height] => 1440
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9380142ca8a7a61849f38d376313c2ca?rik=2vcN7lIKrq1CwQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0EC013DAADD2F3426FDFC142ADAE0A52EE0DF7DA
                                    [accentColor] => 604130
                                )

                            [8C750E7A208C3C68EC095867DD53B18192973AB0] => Array
                                (
                                    [name] => Group 5 - GBS (B) - Coe's Case - 15th June submisson - Aparna R Jayan ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.K_9DvYw2lxIVuvmK7pU-uwHaJl?pid=Api
                                    [datePublished] => 2022-12-25T17:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/c490b5741984570318a1b099a00d5bad/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/indian-institute-of-management-kozhikode/managing-business-market/group-5-gbs-b-coes-case-15th-june-submisson/32532907
                                    [contentSize] => 206128 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2bff43bd8c36971215baf98aee953ebb?rik=yFfgpwLIw4bOkA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0BA37929181B35DD768590CE86C3C802A7E057C8
                                    [accentColor] => 3E3E3E
                                )

                            [30BDA8DE08AED664F64B38709486CECB297A580F] => Array
                                (
                                    [name] => PGP College Of Arts & Science
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.CZtWezXJKWMk5tRHBbBPOgHaC4?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pgpartscollege.ac.in/images/slider/slider-2.jpg
                                    [hostPageUrl] => https://www.pgpartscollege.ac.in/
                                    [contentSize] => 830974 B
                                    [width] => 2000
                                    [height] => 777
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.099b567b35c9296324e6d44705b04f3a?rik=A9uK7YDqbUZvtA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F085A792BCEC68490783B46F466DEA80ED8ADB03
                                    [accentColor] => 7F644C
                                )

                            [D48314A1EB2D7CB82C274BB4996DBB374BFB2D77] => Array
                                (
                                    [name] => PGP-06-CV | Hunter Industries
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Qlk6lKsyT9gCrQUpBMKa_gHaHa?pid=Api
                                    [datePublished] => 2023-08-17T21:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hunterirrigation.com/sites/default/files/imported_images/PGP-06_001_RT.png
                                    [hostPageUrl] => https://www.hunterirrigation.com/irrigation-product/pgpr-ultra/pgp-06-cv
                                    [contentSize] => 162485 B
                                    [width] => 1080
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.42593a94ab324fd802ad052904c29afe?rik=TThBGr7Sx4vCcg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 77D2BFB473BBD6994BB472C28BC7D2BE1A41384D
                                    [accentColor] => 043CC7
                                )

                            [B11B4B7024AE42B010CF962732FDC77F29B5670E] => Array
                                (
                                    [name] => Top 6 Smart Text Encryption Software
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.RaXVxAImPB46JxRGw3pr2QHaFf?pid=Api
                                    [datePublished] => 2017-12-29T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.wondershare.com/pdfelement/pdf-business-tips/gizmomarks.jpg
                                    [hostPageUrl] => https://pdf.wondershare.com/business/text-encryption.html
                                    [contentSize] => 87291 B
                                    [width] => 794
                                    [height] => 588
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.45a5d5c402263c1e3a271446c37a6bd9?rik=G7G0B0LqJAsB%2fA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E0765B92F77CDF237269FC010B24EA4207B4B11B
                                    [accentColor] => 1897B3
                                )

                            [798F00BF2F4DA66C7DEED92AB1D1673F6071D4F3] => Array
                                (
                                    [name] => Grade R English - Basic Phrases - Word Cards: The Weather
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Rxtxo14K0aXYcK84yPpn9gHaDt?pid=Api
                                    [datePublished] => 2024-07-31T13:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/eb/cd/za-hl-1705392578-grade-r-basic-phrases-the-weather_ver_1.jpg
                                    [hostPageUrl] => https://www.twinkl.co.in/resource/grade-r-basic-phrases-the-weather-za-hl-1705392578
                                    [contentSize] => 55705 B
                                    [width] => 630
                                    [height] => 315
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.471b71a35e0ad1a5d870af38c8fa67f6?rik=l%2fgA%2b%2fLUasbX7g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3F4D1706F3761D1BA29DEED7C66AD4F2FB00F897
                                    [accentColor] => C69305
                                )

                            [FE3E5E41133A461D35827095ACFD71AE7BEA851B] => Array
                                (
                                    [name] => ISB PGP: Global Top One-Year Management Programme
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.laqALQFKmHmO7aqDlaksbAHaDw?pid=Api
                                    [datePublished] => 2017-06-06T10:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2Fw1epuutk%2Fisb-pgp-hyderabad-1.webp%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75
                                    [hostPageUrl] => https://www.isb.edu/programmes/post-graduate-programmes/pgp-in-management
                                    [contentSize] => 114407 B
                                    [width] => 1920
                                    [height] => 975
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.95aa802d014a98798eedaa8395a92c6c?rik=7%2bPlFDGjZNFTKA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B158AEB7EA17DFCA59072853D164A33114E5E3EF
                                    [accentColor] => 2049AB
                                )

                            [D7A55A6F20006607B6CE3DA65161EDE2A4E34C93] => Array
                                (
                                    [name] => IOT: A comparative study of different encryption techniques: Buy IOT: A ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.dKe0yAyadHX9pL9eUFaXXgAAAA?pid=Api
                                    [datePublished] => 2022-07-31T13:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://rukmini1.flixcart.com/image/300/300/kjswia80/book/q/r/e/iot-a-comparative-study-of-different-encryption-techniques-original-imafzafjd8u46gmx.jpeg
                                    [hostPageUrl] => https://www.flipkart.com/iot-comparative-study-different-encryption-techniques/p/itm579eb4e899bf8
                                    [contentSize] => 13714 B
                                    [width] => 200
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.74a7b4c80c9a7475fda4bf5e5056975e?rik=fVql9gIAZnBr7A&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkjswia80%2fbook%2fq%2fr%2fe%2fiot-a-comparative-study-of-different-encryption-techniques-original-imafzafjd8u46gmx.jpeg&ehk=gu1wo%2fr%2fgJW%2b9ogbFY69maAMliZojzqi6L4udZBmIMU%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 39C43E4A2EDE16156AD3EC6B70660002F6A55A7D
                                    [accentColor] => AA2122
                                )

                            [E089027FC1CC8E6E320638709486CECB297A580F] => Array
                                (
                                    [name] => PGP College Of Arts & Science
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.nAO1jBrDXb9NHQt4Hot7qgHaBa?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pgpartscollege.ac.in/images/pgp-arts/pgp-logo.webp
                                    [hostPageUrl] => https://www.pgpartscollege.ac.in/
                                    [contentSize] => 114004 B
                                    [width] => 879
                                    [height] => 168
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9c03b58c1ac35dbf4d1d0b781e8b7baa?rik=Dpgg9xzM6OYjYA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F085A792BCEC684907836023E6E8CC1CF720980E
                                    [accentColor] => B31829
                                )

                            [DE73315171F2160F99A6088B7FB9439A3C362193] => Array
                                (
                                    [name] => PGP Educational Institutions, Namakkal
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.1w_kU_0k-JNm42-NA6r4ngHaGA?pid=Api
                                    [datePublished] => 2023-03-22T05:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgpews.in/intlschool_logo.png
                                    [hostPageUrl] => https://pgpews.in/
                                    [contentSize] => 38635 B
                                    [width] => 500
                                    [height] => 406
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d70fe453fd24f89366e36f8d03aaf89e?rik=7TcTFRcvYfCZag&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 391263C3A9349BF7B8806A99F0612F17151337ED
                                    [accentColor] => 09378B
                                )

                            [19E470CD17F0CB15E3EBFDF6243F2DDAAD310CE0] => Array
                                (
                                    [name] => ISB PGP PRO: Executive MBA for Working Professionals
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.02jKcT48ONpSCm0icaik5wHaDw?pid=Api
                                    [datePublished] => 2020-07-19T12:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.isb.edu/_next/image?url=https:%2F%2Fprodcd.isb.edu%2Fmedia%2F1dec2a2t%2Fpgp-pro-2.jpg%3Fwidth%3D1920%26format%3Dwebp%26quality%3D100&w=3840&q=75
                                    [hostPageUrl] => https://www.isb.edu/programmes/post-graduate-programmes/pgp-pro
                                    [contentSize] => 136180 B
                                    [width] => 1920
                                    [height] => 975
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d368ca713e3c38da520a6d2271a8a4e7?rik=kU4H3HEPvFE%2bvg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0EC013DAADD2F3426FDFBE3E51BC0F71DC074E91
                                    [accentColor] => 91503A
                                )

                            [D65518FA354300A5BDD9279585B68B5C687BF3D9] => Array
                                (
                                    [name] => PGP Polytechnic College, Namakkal
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.g1304SF2uljdGMiSP2qVKgHaE6?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgppolytechnic.edu.in/slider_images/SLIDER3_2021-06-07%2013_23_16.png
                                    [hostPageUrl] => https://pgppolytechnic.edu.in/
                                    [contentSize] => 1215804 B
                                    [width] => 4288
                                    [height] => 2848
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.835df4e12176ba58dd18c8923f6a952a?rik=bVWBr1M0AFrbnQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9D3FB786C5B86B5859729DDB5A003453AF81556D
                                    [accentColor] => 7F883B
                                )

                            [3DE2517F7B2CE2406C42083FA5FEDC7E860BA742] => Array
                                (
                                    [name] => PGP College of Physiotherapy, Namakkal (IN)
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Y6D2_X0wCQ9MfXPP_Q769QHaEh?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgpcopt.edu.in/post_images/POST_2022-05-20%2011_27_57.png
                                    [hostPageUrl] => https://pgpcopt.edu.in/
                                    [contentSize] => 90624 B
                                    [width] => 1280
                                    [height] => 782
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.63a0f6fd7d30090f4c7d73cffd0efaf5?rik=0y4V97fCLgTGJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 247AB068E7CDEF5AF38024C6042EC2B7F7152ED3
                                    [accentColor] => 232A5B
                                )

                            [B7F97B672C3E87CE274F681D049A1FC0FAC2E83A] => Array
                                (
                                    [name] => Indian Institute of Management Kozhikode - IIMK
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.K4IAOHGieApEcQJw1hjpfAHaLH?pid=Api
                                    [datePublished] => 2021-09-24T00:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://iimk.ac.in/uploads/admission_application/medium/PGP_25_301.jpg
                                    [hostPageUrl] => https://iimk.ac.in/studentAchievements/pgp
                                    [contentSize] => 1235775 B
                                    [width] => 1200
                                    [height] => 1800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2b82003871a2780a44710270d618e97c?rik=e5%2b3dsLjeOxy9A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A38E2CAF0CF1A940D186F472EC78E3C276B79F7B
                                    [accentColor] => 344963
                                )

                            [0708A1A9E81DB1CC2771321F6A40B5B3D4F940C5] => Array
                                (
                                    [name] => PGP Title Office Photos
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.1kIpfdgQ61hvMAq4ZjSfawAAAA?pid=Api
                                    [datePublished] => 2022-02-07T19:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media.glassdoor.com/lst2x/1609448/pgp-title-office.jpg
                                    [hostPageUrl] => https://www.glassdoor.co.in/Photos/PGP-Title-Office-Photos-IMG1192835.htm
                                    [contentSize] => 23963 B
                                    [width] => 420
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d642297dd810eb586f300ab866349f6b?rik=cIAamo7RG8xyFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5C049F4D3B5B04A6F1231772CC1BD18E9A1A8070
                                    [accentColor] => 455C86
                                )

                            [34EEC6E4A778F7301B371D633228C661EC9CDAA5] => Array
                                (
                                    [name] => PGP College of Pharmaceutical Science and Research Institute, Namakkal
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.X83RXuQQgTWU6aT21FAbwAHaCO?pid=Api
                                    [datePublished] => 2021-07-24T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgppharmacy.edu.in/img/logo/logo_new.jpeg
                                    [hostPageUrl] => https://pgppharmacy.edu.in/
                                    [contentSize] => 12098 B
                                    [width] => 500
                                    [height] => 150
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5fcdd15ee410813594e9a4f6d4501bc0?rik=Q%2b5sTnqHfwOxcw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5AADC9CE166C822336D173B1037F877A4E6CEE43
                                    [accentColor] => 0C3179
                                )

                            [DF761A85DC1BE9C2E27133E942AF23A83AC13C80] => Array
                                (
                                    [name] => PGP Glass nimmt neue Greenfield Glasanlage von HORN in Betrieb
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0tnK3K58bXCt0yB-5-VtPAHaFD?pid=Api
                                    [datePublished] => 2021-10-17T15:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.hornglass.com/fileadmin/_processed_/7/e/csm_3_21e04e0c3b.jpg
                                    [hostPageUrl] => https://www.hornglass.com/de/unternehmen/news/detail/pgp-glass-nimmt-neue-greenfield-glasanlage-von-horn-in-betrieb
                                    [contentSize] => 258666 B
                                    [width] => 1200
                                    [height] => 820
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d2d9cadcae7c6d70add3207ee7e56d3c?rik=%2fWehWM2xniwuFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 08C31CA38A32FA249E33172E2C9EB1CD58A167FD
                                    [accentColor] => A55126
                                )

                            [54054AE280A3BCD18E1B5CE6DD150B95903E2329] => Array
                                (
                                    [name] => What to Know About PCI DSS Compliance and Email
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.iHxD1HBXsnjGrTNtZD90BwHaGf?pid=Api
                                    [datePublished] => 2020-11-05T17:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.acodez.in/wp-content/uploads/2020/11/virtru-email-encryption.png
                                    [hostPageUrl] => https://acodez.in/pci-compliance-email-credit-card-information/
                                    [contentSize] => 25359 B
                                    [width] => 479
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.887c43d47057b278c6ad336d643f7407?rik=RVCkLgg6yx3osQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 9232E30959B051DD6EC5B1E81DCB3A082EA45045
                                    [accentColor] => 0144CA
                                )

                            [90EFA2FCA2CFE6E9A77C088B7FB9439A3C362193] => Array
                                (
                                    [name] => PGP Educational Institutions, Namakkal
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ZMORI7AdjRIuDArMe-8YbQHaGi?pid=Api
                                    [datePublished] => 2023-03-22T05:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pgpews.in/arts_logo.png
                                    [hostPageUrl] => https://pgpews.in/
                                    [contentSize] => 28175 B
                                    [width] => 500
                                    [height] => 441
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.64c39123b01d8d122e0c0acc7bef186d?rik=Cf4qzyr8bp56xw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 391263C3A9349BF7B880C77A9E6EFC2ACF2AFE09
                                    [accentColor] => 001052
                                )

                            [23BDA731CCF969488E6F76DEAC8242740661BCB1] => Array
                                (
                                    [name] => Reimagining Management for Social Change | ISDM
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.qZ3nni4mToAsPmT4lECE6AHaHa?pid=Api
                                    [datePublished] => 2016-09-07T17:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.isdm.org.in/sites/default/files/2023-12/admission-open-for-pgp-dm.jpg
                                    [hostPageUrl] => https://www.isdm.org.in/
                                    [contentSize] => 133110 B
                                    [width] => 1250
                                    [height] => 1250
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a99de79e2e264e802c3e64f8944084e8?rik=Mtt6E8yfloTo9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1BCB1660472428CAED67F6E884969FCC137ADB32
                                    [accentColor] => 0E4282
                                )

                            [9D111C347370779CC96FF132BE53144F1EB867EB] => Array
                                (
                                    [name] => helpBIOTECH
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.FEEIdd5XPnrG9a_CiNzaVAAAAA?pid=Api
                                    [datePublished] => 2019-05-03T14:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiodL8omMrv0SCSJunSwCZTc1NJo8qvOFZ5pKcUDiH0acULo5RPR_EdINwp1iZrchyphenhyphen0Sg5YYLdZbulxTKVjj-PaCaYQmPmmvX2Qi8yYF4nrTckVojlhdNOpThBLbY_lRYWkm8GDSb6UPk-j2daCt4SuOzFfo7ryELAmdg6eNk3K1nD5SA58PwUXithbn_8Q/w680/PGP-College.png
                                    [hostPageUrl] => https://www.helpbiotech.co.in/search/label/Jobs
                                    [contentSize] => 180576 B
                                    [width] => 439
                                    [height] => 435
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.14410875de573e7ac6f5afc288dcda54?rik=2RHBQzcHd8mc9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => BE768BE1F44135EB231FF69CC977073743C111D9
                                    [accentColor] => BAB211
                                )

                            [D8D2D801023DE1D9CBBED8E4C113D11CBF072A7C] => Array
                                (
                                    [name] => Data Encryption Standard in hindi (DES in hindi)
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.jthSDGBvo7MwW9d6qsSi7wHaHJ?pid=Api
                                    [datePublished] => 2022-11-01T07:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiEGzDtYaLNikPQIdsBjJOPmPiXO3t4-zfMCWWk9Gg0CPafelQSvcF6h66FlcE0kUZG1aySEWKG3S-5OZZkyqsvfKX9dv-XhB4azV_1InGA4SqlEu_AIUDAqn6i64mfiHzLg80iZb20trxB9-7qpwd-Mts_FhjN1HyXtWuoyYQPqGckGt1niHF__hTaQ/w653-h630/sub.png
                                    [hostPageUrl] => https://www.computernetworksite.in/2022/10/data-encryption-standard-in-hindi.html
                                    [contentSize] => 45689 B
                                    [width] => 653
                                    [height] => 630
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8ed8520c606fa3b3305bd77aaac4a2ef?rik=jS2NECDTHp286w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C7A270FBC11D311C4E8DEBBC9D1ED320108D2D8D
                                    [accentColor] => 018DCA
                                )

                            [A7555D0679B527DD0AEA76DEAC8242740661BCB1] => Array
                                (
                                    [name] => Reimagining Management for Social Change | ISDM
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.MlKK4W29FNvlckeNsnu34gHaHa?pid=Api
                                    [datePublished] => 2016-09-07T17:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.isdm.org.in/sites/default/files/2024-12/pgp-dm-admission-launch.jpg
                                    [hostPageUrl] => https://www.isdm.org.in/
                                    [contentSize] => 102290 B
                                    [width] => 800
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.32528ae16dbd14dbe572478db27bb7e2?rik=elXVYJdbct2grg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1BCB1660472428CAED67AEA0DD725B9760D5557A
                                    [accentColor] => A97622
                                )

                            [535600142064EFCFB6C138709486CECB297A580F] => Array
                                (
                                    [name] => PGP College Of Arts & Science
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.XYf7Ort30m6etHIMEMdcawHaBa?pid=Api
                                    [datePublished] => 2022-09-01T10:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pgpartscollege.ac.in/images/image/logo.png
                                    [hostPageUrl] => https://www.pgpartscollege.ac.in/
                                    [contentSize] => 49405 B
                                    [width] => 879
                                    [height] => 168
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5d87fb3abb77d26e9eb4720c10c75c6b?rik=NWUAQQJG%2fvxrHA&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => F085A792BCEC684907831C6BFCFE460241006535
                                    [accentColor] => B41726
                                )

                            [CD872A63B08E95F9B0C771A67321D8AA080D1490] => Array
                                (
                                    [name] => WD Western Digital 2Tb My Passport Portable Ssd, 1050Mb/S R, 1000Mb/S W ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QM2s9JElg98Dg3oTST4p4AHaNc?pid=Api
                                    [datePublished] => 2021-10-22T23:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81YQgC-lRRL._AC_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Western-Digital-Passport-Protection-Encryption/dp/B08HDLYM8P
                                    [contentSize] => 365622 B
                                    [width] => 1086
                                    [height] => 1972
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.40cdacf4912583df03837a13493e29e0?rik=3HiiNgvoWZ8LfA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0941D080AA8D12376A177C0B9F59E80B36A278DC
                                    [accentColor] => 44210D
                                )

                            [81BED88B81E4C298B3D694112B276ADA8544B3D7] => Array
                                (
                                    [name] => Photo Gallery
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.d8hQpxEtQLa68HTKeHgXXAAAAA?pid=Api
                                    [datePublished] => 2024-04-13T11:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://forms.iimk.ac.in/convocation26/albums/PGP/thumbs/DSC01929.JPG
                                    [hostPageUrl] => https://forms.iimk.ac.in/convocation26/photogallery.php
                                    [contentSize] => 116325 B
                                    [width] => 150
                                    [height] => 100
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.77c850a7112d40b6baf074ca7878175c?rik=GOuNuBhOLIk7bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7D3B4458ADA672B211496D3B892C4E18B88DEB18
                                    [accentColor] => 0C9ABF
                                )

                            [7869134BAF333BF44AE594112B276ADA8544B3D7] => Array
                                (
                                    [name] => Photo Gallery
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Nyy7ekz0WHeYGrD07FvZ-gAAAA?pid=Api
                                    [datePublished] => 2024-04-13T11:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://forms.iimk.ac.in/convocation26/albums/PGP-LSM/thumbs/DSC04000.JPG
                                    [hostPageUrl] => https://forms.iimk.ac.in/convocation26/photogallery.php
                                    [contentSize] => 116187 B
                                    [width] => 150
                                    [height] => 100
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.372cbb7a4cf45877981ab0f4ec5bd9fa?rik=h5YxtPozs0%2bkXg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7D3B4458ADA672B211495EA44FB333FAB4319687
                                    [accentColor] => 0638C5
                                )

                            [3D34D943F747C706DF2F9DAE389A57E12B251A5C] => Array
                                (
                                    [name] => Indian Institute of Management Kozhikode - IIMK
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.OnjSjJJiAIsMig6COrkNdQHaEX?pid=Api
                                    [datePublished] => 2022-07-04T08:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://iimk.ac.in/uploads/userfiles/2-%20Chief%20Guest%20Abraham%20Stephanos,%20Guest%20of%20Honour%20Prashant%20Nair%20with%20Director%20Debashis%20Chaterjee%20and%20Deans%20during%20IIMK%20programme%20inauguration(1).jpg
                                    [hostPageUrl] => https://iimk.ac.in/announcements/pgp-26-inauguration
                                    [contentSize] => 1929617 B
                                    [width] => 2688
                                    [height] => 1584
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3a78d28c9262008b0c8a0e823ab90d75?rik=00OdNH90fGD98g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C5A152B21E75A983EAD9F2FD607C747F349D43D3
                                    [accentColor] => 72422B
                                )

                            [F1601BB5CFDFD780881BC775475B2212122A116E] => Array
                                (
                                    [name] => Sandisk Extreme Portable 1TB, 1050MB/s R, 1000MB/s W, 3mtr Drop ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.p5xwp3S1tQyf0qHsGKGI7gAAAA?pid=Api
                                    [datePublished] => 2023-07-24T11:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41eTFK7clfL._AC_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Sandisk-Protection-Resistance-Encryption-Smartphone/dp/B0C59G4TLQ
                                    [contentSize] => 24345 B
                                    [width] => 217
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a79c70a774b5b50c9fd2a1ec18a188ee?rik=HwaxW%2fz9fQiIsQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E611A2212122B574577CB188087DFDFC5BB1061F
                                    [accentColor] => AA3A21
                                )

                            [08103C8742B138E494A2C3DDDF080AB3A2215F9C] => Array
                                (
                                    [name] => Java - Encryption and Decryption of an Image Using Blowfish Algorithm
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.r9CAOVzNqK71qkLsIMTExwHaEK?pid=Api
                                    [datePublished] => 2018-07-26T14:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://farm6.staticflickr.com/5486/9487017392_d5d0be206b_b_d.jpg
                                    [hostPageUrl] => https://www.theinsanetechie.in/2013/08/java-encryption-and-decryption-of-image.html
                                    [contentSize] => 79986 B
                                    [width] => 1024
                                    [height] => 576
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.afd080395ccda8aef5aa42ec20c4c4c7?rik=gAHDeCQbg05JKg&riu=http%3a%2f%2ffarm6.staticflickr.com%2f5486%2f9487017392_d5d0be206b_b_d.jpg&ehk=g5WEroSHVAiSRFTe%2bx4%2frj2t4cK2vEs5HV146xou25A%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C9F5122A3BA080FDDD3C2A494E831B2478C30180
                                    [accentColor] => 1C64AF
                                )

                            [D9DF24BED6BB0D79B7A1C9ED0043A97B1B995C24] => Array
                                (
                                    [name] => Advanced Encryption Package 2025 6.12 - Download for PC Free
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.IA46WkWrAAp36fB0QJWgbwHaFY?pid=Api
                                    [datePublished] => 2018-06-19T13:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-1.jpg
                                    [hostPageUrl] => https://www.malavida.com/en/soft/advanced-encryption-package/
                                    [contentSize] => 32652 B
                                    [width] => 550
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.200e3a5a45ab000a77e9f0744095a06f?rik=nf1C62270Jd7Gg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 42C599B1B79A3400DE9C1A7B97D0BB6DEB42FD9D
                                    [accentColor] => 04C728
                                )

                            [DB40E207108FCDF636AE860C4732A3C96CBC450B] => Array
                                (
                                    [name] => Buy Programmable Logic Controller, Super Encryption Stable Connecting ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP._dSfM5pd3JsOfy_1jAp_rQHaHa?pid=Api
                                    [datePublished] => 2024-05-21T11:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/71r1JYgvayL.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/431984067-programmable-logic-controller-super-encryption-stable-connecting-performance-plc-industrial-control-board-for-mitsubishi-fx-2-n-20-mr-programming-bare-board-shell
                                    [contentSize] => 178483 B
                                    [width] => 1601
                                    [height] => 1601
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fdd49f339a5ddc9b0e7f2ff58c0a7fad?rik=vQQucAH43G9j6g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B054CBC69C3A2374C068EA636FDCF801702E04BD
                                    [accentColor] => 736758
                                )

                            [FC2746B58004E9D7FF5F2EB1F46184B2C6434C14] => Array
                                (
                                    [name] => PGP Polytechnic College, Paramathi, Namakkal : Admissions 2025, Courses ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Ja0Eu0e9V_V1L6oXkZViZAAAAA?pid=Api
                                    [datePublished] => 2022-11-07T01:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.vidyavision.com/CollegeUploads/Photos/2019-07-9-12-32-02_PGP%20Polytechnic%20College.jpg
                                    [hostPageUrl] => https://www.vidyavision.com/college/p-g-p-polytechnic-college-paramathi-namakkal-tamilnadu
                                    [contentSize] => 213346 B
                                    [width] => 350
                                    [height] => 270
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.25ad04bb47bd57f5752faa1791956264?rik=z3JkWwhAnn3%2f9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 41C4346C2B48164F1BE2F5FF7D9E40085B6472CF
                                    [accentColor] => 3F708C
                                )

                            [F438998DA95C9F17286C4E0E3B0BBC4AF563026F] => Array
                                (
                                    [name] => Generate Random Password in Linux - Command Line - Yeah Hub
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.fNvpqRwBzl-CBQ0smrvJPwHaCS?pid=Api
                                    [datePublished] => 2018-10-19T05:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2018/09/random-password-linux-4.png
                                    [hostPageUrl] => https://www.yeahhub.com/generate-random-password-linux-command-line/
                                    [contentSize] => 24005 B
                                    [width] => 907
                                    [height] => 280
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7cdbe9a91c01ce5f82050d2c9abbc93f?rik=T4OZ2JrF%2bXGCxg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F620365FA4CBB0B3E0E4C68271F9C59AD899834F
                                    [accentColor] => 7E1414
                                )

                            [EB1D9BE7E698CBAAF7AD227CA975892B013AA522] => Array
                                (
                                    [name] => Understanding the potential asphyxiation hazards of gases | A Linde Company
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ZzsggPVCkvKWJYxSKYGaQgHaDE?pid=Api
                                    [datePublished] => 2024-10-28T13:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://assets.linde.com/-/media/celum-connect/2023/10/16/15/27/linde20gases20cylindersargonimg20100014presscmyk125208.png?impolicy=focal-point&cw=856&ch=354&fx=1500&fy=1063&r=57c30ad7d1
                                    [hostPageUrl] => https://www.lindeindia.in/what-we-offer/industrial-gases/gases/health-and-safety/mitigating-asphyxiation-risks
                                    [contentSize] => 64109 B
                                    [width] => 856
                                    [height] => 354
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.673b2080f54292f296258c5229819a42?rik=vtG5fm6JvKp%2f2g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 225AA310B298579AC722DA7FAABC896E7EB9D1BE
                                    [accentColor] => 428E07
                                )

                            [923376A0DCBA9B686EA2D4C789C95E0D8BB178EF] => Array
                                (
                                    [name] => WD Western Digital 1Tb My Passport Portable Ssd, 1050Mb/S R, 1000Mb/S W ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.EU5twi_mlMZ1t-8ZLerXUAAAAA?pid=Api
                                    [datePublished] => 2020-11-13T17:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41j1FyZho0L._AC_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Passport-1050MB-1000MB-Write-Warranty/dp/B08F2G1XPH
                                    [contentSize] => 13093 B
                                    [width] => 216
                                    [height] => 390
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.114e6dc22fe694c675b7ef192dead750?rik=KTNnCs2ruYbmKg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FE871BB8D0E59C987C4D2AE686B9ABCD0A673329
                                    [accentColor] => 6B6064
                                )

                            [6541EB90447279C9BAB0F2024BACE39EFB2F9D28] => Array
                                (
                                    [name] => geocaruso (@geocaruso@mstdn.social) - Mastodon 🐘
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yoytmZD6wFO7fXRLz2t-TAHaFX?pid=Api
                                    [datePublished] => 2022-11-07T16:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.fosstodon.org/media_attachments/files/110/909/532/938/997/483/original/ff2380ce6adc0256.png
                                    [hostPageUrl] => https://mstdn.social/@geocaruso
                                    [contentSize] => 121342 B
                                    [width] => 813
                                    [height] => 590
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ca8cad9990fac053bb7d744bcf6b7e4c?rik=VhS%2bCUQnl5yrCw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 82D9F2BFE93ECAB4202F0BAB9C97274409BE1456
                                    [accentColor] => 032140
                                )

                            [77E803FC4145E13EFD9D1FBE196BE892F2342379] => Array
                                (
                                    [name] => Hunter PGP-04 Ultra Rotor Sprinkler
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.tbHaFuoJRWh8gYlb52kfyAHaHa?pid=Api
                                    [datePublished] => 2020-04-22T19:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://bahcehavuz.com/f/2020/03/pgp-adj-rotor-sprinkler-dis-mekan-gorseli.jpg
                                    [hostPageUrl] => https://bahcehavuz.com/hunter-pgp-04-ultra-rotor-sprinkler/
                                    [contentSize] => 52232 B
                                    [width] => 600
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b5b1da16ea0945687c81895be7691fc8?rik=d44wzxRUHuPf2Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9732432F298EB691EBF1D9DFE31E5414CF308E77
                                    [accentColor] => A5262E
                                )

                            [2476BE53D0E46FCC167AC9ED0043A97B1B995C24] => Array
                                (
                                    [name] => Advanced Encryption Package 2025 6.12 - Download for PC Free
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.C1Em9RDGdX_p_Iw0WB9PmwHaFY?pid=Api
                                    [datePublished] => 2018-06-19T13:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-3.jpg
                                    [hostPageUrl] => https://www.malavida.com/en/soft/advanced-encryption-package/
                                    [contentSize] => 27190 B
                                    [width] => 550
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0b5126f510c6757fe9fc8c34581f4f9b?rik=QmfrNQ1O9sxhpw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 42C599B1B79A3400DE9CA761CCF64E0D35EB6742
                                    [accentColor] => 988833
                                )

                            [71EA2B87542B55130AF7C9ED0043A97B1B995C24] => Array
                                (
                                    [name] => Advanced Encryption Package 2025 6.12 - Download for PC Free
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2SA0F6ldkPmaAVLRx-XCdgHaFY?pid=Api
                                    [datePublished] => 2018-06-19T13:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://imag.malavida.com/mvimgbig/download-fs/advanced-encryption-package-8058-4.jpg
                                    [hostPageUrl] => https://www.malavida.com/en/soft/advanced-encryption-package/
                                    [contentSize] => 31891 B
                                    [width] => 550
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d9203417a95d90f99a0152d1c7e5c276?rik=F66yeEWyVTGgfw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 42C599B1B79A3400DE9C7FA03155B24578B2AE17
                                    [accentColor] => 938438
                                )

                            [4DC0DAD05CC2AF3A7D25DD9EF3F691C3CA1518C5] => Array
                                (
                                    [name] => Write a program to read two integer values and print true if both the ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.0YjAp83fh_8_jIgv2ZkNfQHaFd?pid=Api
                                    [datePublished] => 2021-07-17T16:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://hi-static.z-dn.net/files/d24/53722750fc15543b4a6f8bc4e2613bf1.jpg
                                    [hostPageUrl] => https://brainly.in/question/43517450
                                    [contentSize] => 55096 B
                                    [width] => 1047
                                    [height] => 772
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d188c0a7cddf87ff3f8c882fd9990d7d?rik=1AytDcUs%2bqPXUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5C8151AC3C196F3FE9DD52D7A3FA2CC50DAD0CD4
                                    [accentColor] => A46427
                                )

                            [F0E3B928299A6FBDFD8B73EE45F006731AF3807E] => Array
                                (
                                    [name] => Hunter PGP-ADJ Rotor Sprinkler
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.StkMLztt3yY9fK1heB1KEwHaHa?pid=Api
                                    [datePublished] => 2020-04-22T19:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://bahcehavuz.com/f/2020/03/pgp-adj-rotor-baslik.jpg
                                    [hostPageUrl] => https://bahcehavuz.com/hunter-pgp-adj-rotor-sprinkler/
                                    [contentSize] => 11286 B
                                    [width] => 600
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4ad90c2f3b6ddf263d7cad61781d4a13?rik=Dz6bgpKp9tvfuA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E7083FA137600F54EE37B8DFDBF6A992829B3E0F
                                    [accentColor] => A32838
                                )

                            [F1A5BC296A59FC2B1F987D1B14FF70A0D29400D0] => Array
                                (
                                    [name] => NICMAR Jan 2023 | Digital Learning Highlights & Updates
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.NW9LC_IH8GpSoPfrkmMd9QHaEK?pid=Api
                                    [datePublished] => 2023-04-03T09:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.nicmar.ac.in/uploads/Certificate_Collage.jpeg
                                    [hostPageUrl] => https://www.nicmar.ac.in/newsletter/jan2023
                                    [contentSize] => 288800 B
                                    [width] => 800
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.356f4b0bf207f06a52a0f7eb92631df5?rik=H1rLkqaVz7LxiQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0D00492D0A07FF41B1D789F1B2CF95A692CB5A1F
                                    [accentColor] => B71421
                                )

                            [E0060D173F63403AF8DB8F6E3FE07961048E9CA5] => Array
                                (
                                    [name] => วิธีปิดการใช้งานการเข้ารหัส BitLocker บน Windows 11 - 8 วิธี
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0O-fAO28AlIjlnOxtNKkRAHaFT?pid=Api
                                    [datePublished] => 2024-05-20T13:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.wondershare.com/recoverit/article/2022/07/disable_windows_11_device_encryption_3.jpg
                                    [hostPageUrl] => https://recoverit.wondershare.com/th/harddrive-recovery/how-to-turn-off-bitlocker-windows-11.html
                                    [contentSize] => 42661 B
                                    [width] => 968
                                    [height] => 694
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d0ef9f00edbc0252239673b1b4d2a444?rik=DmDQcfM2BKOPvQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5AC9E84016970EF3E6F8BD8FA30436F371D0600E
                                    [accentColor] => B5161B
                                )

                            [2B8AA840B545F957E42C182CC30EA92A44F585EF] => Array
                                (
                                    [name] => Resume Examples for Various Industries | Sample CV Templates
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.tEHxkixmquOX1k1u83jwhAHaKe?pid=Api
                                    [datePublished] => 2023-09-01T05:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://resumewritingservices.in/api/public/template_images/image_name_1691630712534.jpg
                                    [hostPageUrl] => https://resumewritingservices.in/resume/examples
                                    [contentSize] => 516306 B
                                    [width] => 1653
                                    [height] => 2339
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b441f1922c66aae397d64d6ef378f084?rik=sqiKBFtUn3VOwg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FE585F44A29AE03CC281C24E759F545B048AA8B2
                                    [accentColor] => 042E57
                                )

                            [5BF966EC8A5C72BCC035555D97CCAF68950A43D4] => Array
                                (
                                    [name] => Bearing Lock Nuts R Type | MISUMI | MISUMI India
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.KJSHenxkdYhSUgQRMwD13QHaC-?pid=Api
                                    [datePublished] => 2021-10-10T16:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://th.misumi-ec.com/en/linked/item/10310432449/img/a210006.jpg
                                    [hostPageUrl] => https://in.misumi-ec.com/vona2/detail/110310432449/
                                    [contentSize] => 102315 B
                                    [width] => 880
                                    [height] => 353
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2894877a7c647588525204113300f5dd?rik=tZ9mzqjFJ8sMUw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4D34A05986FACC79D555530CCB27C5A8CE669FB5
                                    [accentColor] => BE0A1C
                                )

                            [5D2A44DF91E72EEC87DE3AE19D7D7074D6049704] => Array
                                (
                                    [name] => Indian Institute of Management Ahmedabad (IIMA) - Endowment Fund
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._tsOWJI1auKoULBLrCt6AwAAAA?pid=Api
                                    [datePublished] => 2022-11-03T20:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.iima.ac.in/sites/default/files/2022-09/Vindi%20Banga.jpg
                                    [hostPageUrl] => https://www.iima.ac.in/giving
                                    [contentSize] => 5842 B
                                    [width] => 256
                                    [height] => 256
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fedb0e5892356ae2a850b04bac2b7a03?rik=1aJE%2fRl%2b4s547Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4079406D4707D7D91EA3ED78CEE27E19FD44A2D5
                                    [accentColor] => 4D7E7E
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => PGP Key
                                    [displayText] => PGP Key
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Key&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5828.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Key
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Key&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Email Encryption PGP
                                    [displayText] => Email Encryption PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Email+Encryption+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5830.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Email+Encryption+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Email+Encryption+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => PGP Encryption Diagram
                                    [displayText] => PGP Encryption Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5832.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Encryption+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => PGP Protocol
                                    [displayText] => PGP Protocol
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Protocol&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5834.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Protocol
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Protocol&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => PGP Encryption Icon
                                    [displayText] => PGP Encryption Icon
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Icon&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5836.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Icon
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => PGP in Cryptography
                                    [displayText] => PGP in Cryptography
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+in+Cryptography&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5838.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+in+Cryptography
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+in+Cryptography&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => PGP Key Example
                                    [displayText] => PGP Key Example
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Key+Example&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5840.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Key+Example
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PGP+Key+Example&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => PGP Message
                                    [displayText] => PGP Message
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Message&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5842.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Message
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Message&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => PGP Authentication
                                    [displayText] => PGP Authentication
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Authentication&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5844.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Authentication
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Authentication&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => PGP Email Security
                                    [displayText] => PGP Email Security
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Email+Security&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5846.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Email+Security
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Email+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => PGP Message Format
                                    [displayText] => PGP Message Format
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Message+Format&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5848.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Message+Format
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Message+Format&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => How PGP Works
                                    [displayText] => How PGP Works
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+PGP+Works&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5850.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+PGP+Works
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=How+PGP+Works&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => PGP File
                                    [displayText] => PGP File
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+File&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5852.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+File
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+File&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Asymmetrical Encryption
                                    [displayText] => Asymmetrical Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Asymmetrical+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5854.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Asymmetrical+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Asymmetrical+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => PGP Encryption Tool
                                    [displayText] => PGP Encryption Tool
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Tool&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5856.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Tool
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PGP+Encryption+Tool&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => PGP Encryption Software Free Download
                                    [displayText] => PGP Encryption Software Free Download
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Software+Free+Download&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5858.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Software+Free+Download
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+Software+Free+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => PGP Decrypt
                                    [displayText] => PGP Decrypt
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Decrypt&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5860.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Decrypt
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PGP+Decrypt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Asymmetric Encryption
                                    [displayText] => Asymmetric Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Asymmetric+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5862.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Asymmetric+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Asymmetric+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Symmetric Key Encryption
                                    [displayText] => Symmetric Key Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Symmetric+Key+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5864.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Symmetric+Key+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Symmetric+Key+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => GPG Encryption
                                    [displayText] => GPG Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=GPG+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5866.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=GPG+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=GPG+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => PGP SSL
                                    [displayText] => PGP SSL
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+SSL&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5868.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+SSL
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+SSL&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => PGP Public Key Example
                                    [displayText] => PGP Public Key Example
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Public+Key+Example&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5870.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Public+Key+Example
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Public+Key+Example&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => How Does PGP Work
                                    [displayText] => How Does PGP Work
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+Does+PGP+Work&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5872.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+Does+PGP+Work
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=How+Does+PGP+Work&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => PGP File Sample
                                    [displayText] => PGP File Sample
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+File+Sample&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5874.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+File+Sample
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+File+Sample&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => File Share Encryption Powered by PGP
                                    [displayText] => File Share Encryption Powered by PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=File+Share+Encryption+Powered+by+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5876.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=File+Share+Encryption+Powered+by+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=File+Share+Encryption+Powered+by+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => PGP Encryption Bash
                                    [displayText] => PGP Encryption Bash
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Bash&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5878.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Bash
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PGP+Encryption+Bash&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => PGP Encryption Process
                                    [displayText] => PGP Encryption Process
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Process&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5880.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Process
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Encryption+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Examples of PGP
                                    [displayText] => Examples of PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Examples+of+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5882.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Examples+of+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Examples+of+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => PGP Benefits
                                    [displayText] => PGP Benefits
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Benefits&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5884.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Benefits
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Benefits&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Pretty Good Privacy
                                    [displayText] => Pretty Good Privacy
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Pretty+Good+Privacy&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5886.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Pretty+Good+Privacy
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Pretty+Good+Privacy&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [30] => Array
                                (
                                    [text] => Random PGP
                                    [displayText] => Random PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Random+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5888.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Random+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Random+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [31] => Array
                                (
                                    [text] => PGP Encrypt/Decrypt
                                    [displayText] => PGP Encrypt/Decrypt
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encrypt%2fDecrypt&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5890.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encrypt%2fDecrypt
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Encrypt%2fDecrypt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [32] => Array
                                (
                                    [text] => PGP Encryption and Decryption
                                    [displayText] => PGP Encryption and Decryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+and+Decryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5892.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+and+Decryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PGP+Encryption+and+Decryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [33] => Array
                                (
                                    [text] => Hybrid Encryption
                                    [displayText] => Hybrid Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Hybrid+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5894.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Hybrid+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Hybrid+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [34] => Array
                                (
                                    [text] => PGP Encryption Server
                                    [displayText] => PGP Encryption Server
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Server&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5896.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Server
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+Server&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [35] => Array
                                (
                                    [text] => PGP Definition
                                    [displayText] => PGP Definition
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Definition&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5898.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Definition
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [36] => Array
                                (
                                    [text] => PGP Encryption Flow
                                    [displayText] => PGP Encryption Flow
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Flow&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5900.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Flow
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Encryption+Flow&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [37] => Array
                                (
                                    [text] => Kleopatra PGP
                                    [displayText] => Kleopatra PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Kleopatra+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5902.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Kleopatra+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Kleopatra+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [38] => Array
                                (
                                    [text] => PGP Encryption Match
                                    [displayText] => PGP Encryption Match
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Match&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5904.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Match
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+Match&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [39] => Array
                                (
                                    [text] => PGP Encryption Logo
                                    [displayText] => PGP Encryption Logo
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Logo&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5906.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Logo
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+Logo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [40] => Array
                                (
                                    [text] => Sign with PGP
                                    [displayText] => Sign with PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Sign+with+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5908.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Sign+with+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Sign+with+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [41] => Array
                                (
                                    [text] => Working of PGP
                                    [displayText] => Working of PGP
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Working+of+PGP&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5910.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Working+of+PGP
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Working+of+PGP&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [42] => Array
                                (
                                    [text] => PGP Passphrase
                                    [displayText] => PGP Passphrase
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Passphrase&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5912.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Passphrase
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=PGP+Passphrase&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [43] => Array
                                (
                                    [text] => GNU Privacy Guard
                                    [displayText] => GNU Privacy Guard
                                    [webSearchUrl] => https://www.bing.com/images/search?q=GNU+Privacy+Guard&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5914.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=GNU+Privacy+Guard
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=GNU+Privacy+Guard&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [44] => Array
                                (
                                    [text] => PGP Encryption 2042
                                    [displayText] => PGP Encryption 2042
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+2042&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5916.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+2042
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Encryption+2042&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [45] => Array
                                (
                                    [text] => PGP Encryption in Banking
                                    [displayText] => PGP Encryption in Banking
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+in+Banking&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5918.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+in+Banking
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=PGP+Encryption+in+Banking&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [46] => Array
                                (
                                    [text] => Different Encryption Methods
                                    [displayText] => Different Encryption Methods
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Different+Encryption+Methods&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5920.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Different+Encryption+Methods
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Different+Encryption+Methods&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [47] => Array
                                (
                                    [text] => AES Encryption
                                    [displayText] => AES Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=AES+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5922.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=AES+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=AES+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [48] => Array
                                (
                                    [text] => SnapLogic PGP Encryption
                                    [displayText] => SnapLogic PGP Encryption
                                    [webSearchUrl] => https://www.bing.com/images/search?q=SnapLogic+PGP+Encryption&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5924.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=SnapLogic+PGP+Encryption
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=SnapLogic+PGP+Encryption&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [49] => Array
                                (
                                    [text] => PGP Encryption Shirt
                                    [displayText] => PGP Encryption Shirt
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PGP+Encryption+Shirt&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5926.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PGP+Encryption+Shirt
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=PGP+Encryption+Shirt&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1778006783326
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 50
            [first_product_sample] => Array
                (
                    [name] => Session-key based encryption. In the modern world, security is the ...
                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.BitPCQ9AOazpbWyg4IvuQwHaDY?pid=Api
                    [datePublished] => 2022-08-23T21:08:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/1*YNNHK2av8SqX6mjx_A8_Wg.png
                    [hostPageUrl] => https://tech.groww.in/session-key-based-encryption-2c223476c3d4
                    [contentSize] => 322185 B
                    [width] => 1358
                    [height] => 620
                    [cDNContentUrl] => https://th.bing.com/th/id/R.062b4f090f4039ace96d6ca0e08bee43?rik=PemF0cVxDwAQjg&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => F3113243A7198931E7838E10000F71C5D185E93D
                    [accentColor] => C67905
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

How to Discover Better Pgp Encryption Example Options

Try combining terms like fit, fabric, or occasion with your core query. For example, add words like oversized, linen, party, office, or wedding to get more targeted fashion product discovery results.

Search Help

How can I find better fashion options for this search?

Use related searches, refine your keywords by style or occasion, and compare multiple product cards before opening store pages.

Are these results from one store only?

No, Styleberry is a discovery layer that surfaces fashion products from multiple sources to simplify comparison.

Can I search using occasion terms like office or wedding?

Yes, occasion keywords often produce stronger and more relevant results for fashion discovery.

Search