RSA Security

Results: 682



#Item
11Cryptography / Computing / Mass surveillance / Cryptographic protocols / Internet protocols / Applied mathematics / RSA Security / Dual EC DRBG / Bullrun / National Security Agency / IPsec / RSA BSAFE

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
12Computer access control / Computer security / Access token / Token / Security / Access control / Security token / RSA SecurID

Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Add to Reading List

Source URL: www.emeraldgrouppublishing.com

Language: English - Date: 2015-11-25 03:54:07
13Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
14Cryptography / Security / E-commerce / Dell / RSA Security / RSA / Computer security

RSA Case Study New Sales Approach Yields New High for Million-Dollar-Plus Deals Customer Impact “The greatest value we’ve

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2016-03-24 10:48:14
15E-commerce / Security / Cryptography / Computer network security / Computer security / National security / Secure communication / RSA

2016 Editorial Calendar Month Featured Topic Editorial Details

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-05-24 14:49:01
16Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
17Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

Add to Reading List

Source URL: www.cits.rub.de

Language: English - Date: 2014-11-18 10:03:56
18Cryptography / Public-key cryptography / Secret sharing / Key management / Digital signature / Signature / Digital Signature Algorithm / Commitment scheme / Threshold cryptosystem / Semantic security / RSA / Bitcoin

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
19Cryptography / Security / Cyberwarfare / Michael McCaul / RSA Security / Encryption / Computer security / United States House Committee on Homeland Security / Privacy

Officials, Executives Envision Encryption Commission Industry executives and government officials hope to bridge the divide over privacy and national security By CAT ZAKRZEWSKI March 4, :14 a.m. ET As Apple Inc. a

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-04 14:30:03
20Malware / Cyberwarfare / Computer security / Trojan horses / Cybercrime / Computer network security / Social engineering / Zeus / Man-in-the-browser / International cybercrime / Identity theft / Transaction authentication number

RSA 2012 CYBERCRIME TRENDS REPORT The Current State of Cybercrime and What to Expect in 2012 Cybercrime continues to show no signs of slowing down. In fact, 2011 marked a year of new advanced threats and an increased lev

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-05-28 11:33:54
UPDATE