Hellman

Results: 440



#Item
231Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2014-09-25 17:19:13
232Finance / Venture capital / Crowd funding / Angel investor / Capital gains tax / Investment / Financial economics / Private equity

Seed and Early Stage Finance and the Role of Policy 16 September 2014 The guest speakers Thomas Hellman and Anne Glover overviewed the main hurdles affecting the capacity of young innovative firms to access finance and t

Add to Reading List

Source URL: www.bruegel.org

Language: English - Date: 2014-09-17 11:42:17
233Super angel / Hellman / Terminology / Private equity / Venture capital / Angel

Angel Investing: Theory and Data

Add to Reading List

Source URL: www.bruegel.org

Language: English - Date: 2014-09-18 03:47:08
234Key management / Quantum key distribution / Cryptographic protocols / Quantum computer / Id Quantique / Diffie–Hellman key exchange / Key distribution / RSA / Whitfield Diffie / Cryptography / Quantum cryptography / Quantum information science

Encryption Product Portfolio [removed]Encryption Product Portfolio

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-06-06 03:19:32
235Cognitive disorders / Nursing / Dementia / Occupational therapy / Therapy / Activities of daily living / Coffee / Medicine / Health / Aging-associated diseases

What do we need assistive technologies for? Dr. Riitta Hellman Karde AS, Norway AAL Forum 2014

Add to Reading List

Source URL: www.aalforum.eu

Language: English - Date: 2014-09-30 07:02:17
236Coding theory / Hamming weight

Hellman’s TMTO Attack Hellman’s TMTO 1

Add to Reading List

Source URL: www.cs.sjsu.edu

Language: English - Date: 2008-04-17 11:50:05
237Computing / Internet protocols / Secure communication / Internet standards / Password / TLS-SRP / Man-in-the-middle attack / Public-key cryptography / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / Security

Replacing passwords on the Internet AKA post-Snowden Opportunistic Encryption Ben Laurie Google, Inc. Ian Goldberg

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
238Elliptic curve cryptography / NSA Suite B Cryptography / Key / Public-key cryptography / Diffie–Hellman key exchange / Ephemeral key / Static key / Cryptography / Key management / Elliptic curve Diffie–Hellman

Microsoft Word - SuiteB_Implementer_G#[removed]doc

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-09-22 08:04:55
239Diffie–Hellman key exchange / Elliptic curve Diffie–Hellman / Cryptography / Cryptographic protocols / Public-key cryptography

How Secure is TextSecure? Tilman Frosch Christian Mainka Florian Bergsma J¨org Schwenk Christoph Bader Thorsten Holz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-05 07:33:28
240Diffie–Hellman key exchange / Public-key cryptography / Key generation / Key authentication / Algorithm / Key / Cryptography / Key management / Cryptographic protocols

An Ecient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups Jim Alves-Foss Center for Secure and Dependable Software University of Idaho

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
UPDATE