RE

Results: 82318



#Item
11Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-03 11:03:06
12Computing / Data synchronization / Replication / Confidentiality / Experiment / Knowledge / Information and communications technology / Information Age

An important note for Faculty, student RAs, and Technical Staff (e.g., lab managers or programmers) RE: confidentiality and information exposure There will be prediction markets operating in April forecasting th

Add to Reading List

Source URL: experimentaleconreplications.com

Language: English - Date: 2016-04-04 16:18:25
13Economy / Cryptocurrencies / Money / Finance / Alternative currencies / E-commerce / Cryptography / Zcash / Cryptocurrency wallet / Online shopping / Transaction authentication number / Draft:Bitcoin Anonymity

UX CHECKLIST FOR WALLET DEVELOPERS We have compiled a checklist of good practices that can be applied to any cryptocurrency wallet with a graphic user interface. ZCASH FEATURES If you’re building a wallet that supports

Add to Reading List

Source URL: z.cash

Language: English - Date: 2018-10-25 12:40:27
14Medicine / Medical devices / Neurotechnology / Cardiology / Prosthetics / Medical terminology / Neurostimulation / Ventricular assist device / Neuromodulation / Artificial heart / Spinal cord stimulator / Chronic condition

MEDICAL DEVICES ABBOT T TODAY At Abbott, we’re all about helping you live the best life you can through good health. We keep your heart healthy, nourish

Add to Reading List

Source URL: dam.abbott.com

Language: English - Date: 2018-06-29 12:35:54
15Pushout / Recursion / Span / Pullback / Limit / Mathematics / Computing / Philosophy of mathematics

Composition and Re nement of Behavioral Speci cations Dusko Pavlovic and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue Palo Alto, CaliforniaUSA

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:57:16
16Financial Industry Regulatory Authority / United States securities law / Self-regulatory organization / Law / Regulation / Government / Selling away

Microsoft Word - WMBAA Letter to FINRA re NASD Rule 1017.doc

Add to Reading List

Source URL: www.wmbaa.com

Language: English - Date: 2015-05-20 18:24:19
17Economy / Finance / Money / Swap Execution Facility / Commodity markets / Financial markets / National Futures Association / Systemic risk / Tradeweb / Commodity Futures Trading Commission / Financial Industry Regulatory Authority / U.S. Securities and Exchange Commission

Microsoft Word - WASHINGTON-#v7-WMBA_Letter_to_SEC_re__Regulatory_Service_Providers.DOC

Add to Reading List

Source URL: www.wmbaa.com

Language: English - Date: 2012-08-01 08:04:47
18Software / Application software / Administrative regions of Greece / SPICE / Field-programmable gate array / Patras

´sume ´ Re Eftychios Theodorakis Academic Education

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-05 23:18:18
19United States / Paperwork Reduction Act / Human behavior / African Growth and Opportunity Act / Federal Aviation Administration / Transport / Airport / September 11 attacks / United States Department of Transportation

Federal Register / Vol. 66, NoMonday, March 12, Notices institution. The respondents are Social Security beneficiaries who use the Internet to enroll in DD/EFT. Number of Respondents: 3,485. Frequency of Re

Add to Reading List

Source URL: 34.232.160.87

Language: English - Date: 2017-07-06 11:25:58
20Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
UPDATE