RSA Conference

Results: 86



#Item
41RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption

An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-09 19:14:56
42RSA / Keynote / BT Group / Cryptography / EMC Corporation / RSA Conference

NOT FOR IMMEDIATE RELEASE

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2013-07-18 14:10:31
43Design / Communication / Visual arts / Advertising / Communication design / Graphic design

Microsoft Word - RSA Conference 2015 Silver V2.doc

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-08-13 15:40:25
44RSA Conference / RSA / United Kingdom / EMC Corporation / British culture / Royal Society of Arts

Microsoft Word - RSA Conference US 2015 Contract Final.docx

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-08-13 15:44:57
45RSA / Royal Society of Arts / RSA numbers / Cryptography / EMC Corporation / RSA Conference

For More Information Mike FearonRSA® CONFERENCE 2014 GATHERED TOP INFORMATON SECURITY EXPERTS TO ADDRESS CRITICAL CYBERSECURITY ISSUES THROUGH DEBATE AND SHARED LEARNING

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-03-03 13:49:28
46RSA / Whitfield Diffie / Royal Society of Arts / Qualys / Ron Rivest / Vormetric / Veracode / RSA numbers / Cryptography / EMC Corporation / RSA Conference

For More Information Mike FearonRSA® CONFERENCE 2014 OPENS TODAY IN SAN FRANCISCO

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-02-24 09:53:09
47Puzzles / Mechanical puzzles / Computer network security / Client Puzzle Protocol / Proof-of-work system

An extended abstract version of this work appears in: Aggelos Kiayias, editor, Topics in Cryptology – CT-RSA 2011 – The Cryptographers’ Track at the RSA Conference, LNCS, volume 6558, pp. 284–301. Springer, 2011.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-02-20 01:54:21
48Electronic commerce / Digital signature / Public key certificate / RSA / Group signature / BLS / Cryptography / Public-key cryptography / Key management

A preliminary version of this paper appears in Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 276–285, S. De Capitani di Vimercati and P. Syverson eds., ACM Press, 2007. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-02-21 16:37:42
49Computer network security / Crime prevention / National security / DevOps / Information technology management / Software development process / Recreational Software Advisory Council / Cloud computing / Computer security / Software development / Security / Computing

Reading the Tea Leaves of the 2015 RSA Conference Submissions Hugh Thompson Britta Glade

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-12-15 13:13:16
50Imperva / Trend Micro / IBM / Computing / Technology / CA Technologies

RSA CONFERENCE 2014 ® MOSCONE CONVENTION CENTER SOUTH EXHIBIT HALL A-C SAN FRANCISCO, CA

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-02-10 13:11:16
UPDATE