Cryptography

Results: 21893



#Item
831Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
832Security / Prevention / Computing / Data security / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy / HTTP cookie / Information security

UMKC SHORT TERM LOAN - TERMS AND CONDITIONS

Add to Reading List

Source URL: www.sfa.umkc.edu

Language: English - Date: 2006-06-12 18:44:50
833Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
834Cryptography / Advanced Encryption Standard / Block ciphers / Data Encryption Standard / Finite fields / Block size / Rijndael S-box / AES implementations / Blowfish

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:08:26
835Cryptography / Mix network / RSA / Cryptanalysis / Cipher

Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet Shahram Khazaei, Bj¨orn Terelius, Douglas Wikstr¨om, February 24, 2012

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:28
836Voting / Politics / Cryptography / Elections / Electronic voting / Electoral systems / Election technology / Vote counting / Scantegrity / Punchscan / Optical scan voting system / End-to-end auditable voting systems

E-voting Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting Scantegrity is a security enhancement for any optical

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:37
837Cryptography / Free software / Software / Cloud storage / Cryptographic software / OwnCloud / Disk encryption / Key management / Encryption / Internet security / Public-key cryptography / Nextcloud

ownCloud Security and Encryption 2.0 A Technical Overview As the use of file sharing increases across the industry, more attention is being paid to the inherent security of these solutions and the need for corporations t

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-12 11:34:59
838Cryptography / Public-key cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Professional certification / Point and click / Academic degree

CERTIFICATION PROCESS & REQUIREMENTS Superintendent Certificate recommendations require the following:  Master’s degree completed o Send a copy of your Master’s degree transcript (if you earned it through somewher

Add to Reading List

Source URL: coe.sfasu.edu

Language: English - Date: 2015-02-27 14:15:29
839Prevention / Computer access control / Cryptography / Gesture / Security / Multi-touch / Authentication / Password

User-Generated Free-Form Gestures for Authentication: Security and Memorability Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-18 21:13:10
840Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
UPDATE