Public-key cryptography

Results: 11378



#Item
831Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
832Wireless networking / Technology / Computing / IEEE 802.11 / Wi-Fi / Encryption / Public-key cryptography / Bluetooth / Wireless

Proposal for EU legislation Mandatory anonymised, authenticated and end-to-end encrypted communications in all tele­pho­ny and computing devices sold after 201x. Status: DRAFT 0.13

Add to Reading List

Source URL: youbroketheinternet.org

Language: English - Date: 2015-09-29 18:17:30
833Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

Add to Reading List

Source URL: zakird.com

Language: English
834Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Selectively Traceable Anonymity Luis von Ahn1 , Andrew Bortz2 , Nicholas J. Hopper3 , and Kevin O’Neill4 1 Carnegie Mellon University, Pittsburgh, PA USA 2

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2006-10-27 09:31:40
835CERTIFICATION PRACTICE STATEMENT (CPS) Published by eMudhra Limited 3rd Floor, Sai Arcade, Outer Ring Road, Devarabeesanahalli Bengaluru, Karnataka, India

CERTIFICATION PRACTICE STATEMENT (CPS) Published by eMudhra Limited 3rd Floor, Sai Arcade, Outer Ring Road, Devarabeesanahalli Bengaluru, Karnataka, India

Add to Reading List

Source URL: www.e-mudhra.com

Language: English - Date: 2015-06-30 02:40:54
836Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
837Private Use of Untrusted Web Servers via Opportunistic Encryption

Private Use of Untrusted Web Servers via Opportunistic Encryption

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
838./by-Rlt--prod-all-zn-lt-ttl.eps

./by-Rlt--prod-all-zn-lt-ttl.eps

Add to Reading List

Source URL: irl.cs.ucla.edu

Language: English - Date: 2009-12-09 11:21:49
839Validating Caching Resolver Wouter Wijngaards  (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Validating Caching Resolver Wouter Wijngaards (NLnet Labs) http://www.nlnetlabs.nl/ © May 2008 Stichting NLnet Labs

Add to Reading List

Source URL: unbound.nlnetlabs.nl

Language: English - Date: 2008-05-19 08:09:35
840BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota  Abstract. Anonymous blacklisting schemes allow online service providers

BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-12-16 18:40:43