John Key

Results: 597



#Item
151Stream cipher / SXAL/MBAL / Blowfish / Cryptography / Advanced Encryption Standard / Exclusive or

On the Two sh Key Schedule Bruce Schneier?, John Kelsey??, Doug Whiting? ? ? , David Wagnery , Chris Hallz , and Niels Ferguson x Abstract. Two sh is a new block cipher with a 128 bit block, and a

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
152Simple public key infrastructure / Access control / Logic in computer science / Programming language semantics / Access Control Matrix / Kernel / Architecture of Windows NT / Operational semantics / Logical access control / Security / Computer security / Key management

Reconstructing Trust Management Ajay Chander ∗ Drew Dean † John C. Mitchell∗

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2003-02-04 00:01:29
153Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology

Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-28 12:55:55
154

Segal Rogerscasey key research contacts: áá Tim Barron, SVP, Chief Investment Officer, Head of Global Portfolio Solutions áá John Ross, SVP, Head of Beta Research áá Alan Kos

Add to Reading List

Source URL: www.segalrc.com

- Date: 2013-11-20 18:50:26
    155Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

    Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-03-08 09:17:59
    156Law enforcement / Anti-Social Behaviour Order / Law in the Republic of Ireland / Law in the United Kingdom / Fear of crime / Public-order crime / Neighbourhood Statistics / Neighbourhood / Anti-social behaviour / Criminology / Crime

    Research Report 34 Key Implications The drivers of perceptions of anti-social behaviour Simon Mackenzie, Jon Bannister, John Flint, Sadie Parr, Andrew Millie and Jennifer Fleetwood

    Add to Reading List

    Source URL: www.sccjr.ac.uk

    Language: English - Date: 2012-11-16 05:43:58
    157Cipher / RSA / Advantage / Ciphertext stealing / Three-pass protocol / Cryptography / Public-key cryptography / Electronic commerce

    Multi-Dimensional Range Query over Encrypted Data ∗ Elaine Shi John Bethencourt T-H. Hubert Chan Dawn Song Carnegie Mellon University Abstract We design an encryption scheme called Multi-dimensional

    Add to Reading List

    Source URL: i.cs.hku.hk

    Language: English - Date: 2007-09-09 14:20:24
    158Password / Key management / John the Ripper / Crypt / Key derivation function / Brute-force attack / OTPW / Shadow password / Cryptography / Security / Computer security

    Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger Systems and Internet Infrastructure Securit

    Add to Reading List

    Source URL: www.enck.org

    Language: English
    159Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

    Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2007-12-18 00:37:13
    160Financial institutions / Institutional investors / Transportation in the United States / Actuarial science / Iowa Interstate Railroad / Geneva Association / Insurance / Rail transportation in the United States / Financial economics

    SYNOPSIS GLOBAL INSURANCE CAPITAL STANDARDS – CAN DIFFERENT VALUATION APPROACHES BE RECONCILIED? John Maroney, Jules Gribble Key words: Insurance Capital Standards, solvency, IAIS, capital adequacy, valuation, risk exp

    Add to Reading List

    Source URL: www.actuaries.asn.au

    Language: English - Date: 2014-11-30 02:57:47
    UPDATE