Cryptography

Results: 21893



#Item
961Cryptography / IOS jailbreaking / SHSH blob / Commitment scheme / IP / Interactive proof system / Boolean algebra / Challengeresponse authentication

JOURNAL OF COMPUTER AND SYSTEM SCIENCES

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
962Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
963Cryptography / Cer / Orion / Arvada /  Colorado / Public key certificate

Certificate of Certification Orion Registrar, Inc. This is to cer fy the Quality Management System of: AxXis Corpora on 1535 Nandina Avenue

Add to Reading List

Source URL: axxiscorp.us

Language: English - Date: 2016-06-03 17:38:32
964Cryptography / Block cipher modes of operation / Symmetric-key cryptography / Disk encryption / Data Encryption Standard / Initialization vector / Symmetric-key algorithm / IEEE P1619 / Block cipher / Ciphertext stealing / Authenticated encryption / Block size

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
965Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
966Internet / Computing / Cryptography / Internet Standards / Internet protocols / Domain name system / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / DNS spoofing / NSD / Comparison of DNS server software

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
967Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
968Voting / Politics / Cryptography / Elections / Election technology / Electronic voting / Electoral systems / Vote counting / Scantegrity / Punchscan / Optical scan voting system / Ballot

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:38
969Prevention / Security / Safety / Cryptography / Crime prevention / Information governance / National security / Password / Assistive technology / Information security / Computer security / Self-service password reset

Investigating Security-Related Behaviors Among Computer Users With Motor Impairments John D’Arcy Jinjuan Feng

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 09:39:54
970Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
UPDATE