Public-key cryptography

Results: 11378



#Item
871XXIV International Congress of the International Union of Latin Notaries Mexico CityTopic II:

XXIV International Congress of the International Union of Latin Notaries Mexico CityTopic II:

Add to Reading List

Source URL: www.bnotk.de

Language: English - Date: 2010-04-06 03:44:43
872Public-key cryptography / Electronic commerce / Notary / Electronic signature / Public key certificate / Information security / Digital signature / Authentication / Electronic business / Cryptography / Security / Key management

DOC Document

Add to Reading List

Source URL: www.mg.gov.pl

Language: English - Date: 2014-07-24 09:08:33
873Introduction tcpcrypt Performance Conclusion 1/25

Introduction tcpcrypt Performance Conclusion 1/25

Add to Reading List

Source URL: www.tcpcrypt.org

Language: English - Date: 2010-08-13 12:07:58
874Aloaha  PDF Crypter Digital Rights Management for PDF Documents

Aloaha PDF Crypter Digital Rights Management for PDF Documents

Add to Reading List

Source URL: www.aloaha.com

Language: English
875CS255: Cryptography and Computer Security  Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
8761  POSTER: W E S HARE: A Coercion-Resistant and Scalable Storage Cloud Hoon Wei Lim, Loi Luu, Shruti Tople, Prateek Saxena School of Computing, National University of Singapore {hoonwei,loiluu,shruti90,prateeks}@comp.nus

1 POSTER: W E S HARE: A Coercion-Resistant and Scalable Storage Cloud Hoon Wei Lim, Loi Luu, Shruti Tople, Prateek Saxena School of Computing, National University of Singapore {hoonwei,loiluu,shruti90,prateeks}@comp.nus

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-16 03:07:38
877Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices∗ V´eronique Cortier Graham Steel

Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices∗ V´eronique Cortier Graham Steel

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:12
878Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

Microsoft Word - CWA14167-4_without_backup_CMCSO-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:33
879Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-03-23 04:16:10
880GOVERNMENT OF TAMIL NADU  MEDICAL SERVICES RECRUITMENT BOARD 7th Floor, DMS Building, 359, Anna Salai,Teynampet, ChennaiWebsite www.mrb.tn.gov.in e – mail:

GOVERNMENT OF TAMIL NADU MEDICAL SERVICES RECRUITMENT BOARD 7th Floor, DMS Building, 359, Anna Salai,Teynampet, ChennaiWebsite www.mrb.tn.gov.in e – mail:

Add to Reading List

Source URL: www.mrb.tn.gov.in

Language: English - Date: 2013-12-18 00:43:17