Cryptographic engineering

Results: 331



#Item
41Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
42Locksmithing / Rekeying / R-tree / B-tree / Key distribution / Diffie–Hellman key exchange / Public-key cryptography / Self-balancing binary search tree / Tree / Cryptography / Cryptographic protocols / Binary trees

Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee Department of Computer Science & Engineering The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-11 06:27:45
43Cryptographic hash functions / SHA-2 / ALGOL 68 / Program management / Ada / Construction / Computing / Software engineering / Programming language theory

CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-03-13 16:20:11
44Cryptographic protocols / Challenge-response authentication / Password / Cryptographic nonce / Reflection attack / Random password generator / Authentication / Replay attack / Kerberos / Cryptography / Security / Computer security

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
45Cypherpunks / Cryptographic software / Internet privacy / Tor / Institute of Electrical and Electronics Engineers / Nikita Borisov / Bangladesh University of Engineering and Technology / Apache Hadoop / Cloud computing / Computing / Software / Free software

Anupam Das Curriculum Vitae Contact Information

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-01 15:23:20
46Economics / Social engineering / Phishing / Usability / Password / Threat / Internet fraud / Psychology / Cognitive psychology / Behavior / Behavioural sciences / Science

CHAPTER 2 Usability and Psychology Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:38:22
47Wi-Fi Protected Setup / Wireless networking / Technology / Telecommunications engineering / Extensible Authentication Protocol / IEEE 802.11 / Authenticator / HostAP / Supplicant / Wi-Fi / Cryptographic protocols / Computing

Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
48Navigation / Cryptographic software / Proxy servers / Location-based service / Tracking / Internet / Anonymity / Peer-to-peer / Vienna U-Bahn / Internet privacy / File sharing networks / Computing

Collusion-Resistant Query Anonymization for Location-Based Services Qin Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, Arizona Email: {qinzhang, llazos}@email.arizona.

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2014-03-17 19:34:15
49Computer security / Yahoo! / Computing / Email / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Email address / Domain Name System / Email authentication / Spam filtering / Cryptographic protocols

Internet Engineering Task Force (IETF) Request for Comments: 5863 Category: Informational ISSN: T. Hansen

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-05-27 14:26:10
50Data / Disk encryption / Data security / Cross-platform software / TrueCrypt / DBAN / Backup / Data recovery / Software / Computing / Cryptographic software

The Grad Toolkit Tips and Tricks for Success in Graduate School Gurdas Sandhu Dept. of Civil, Construction, and Environmental Engineering

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2014-06-29 21:17:11
UPDATE