Ryan Key

Results: 41



#Item
1

Appears in P. Samarati, P. Ryan, D. Gollmann, R. Molva (Eds.): Computer Security – ESORICS 2004, Springer-Verlag LNCS 3193, pp. 335–351, ISBNA Public-Key Encryption Scheme with Pseudo-Random Ciphertex

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:25:23
    2

    Privacy-supporting cloud computing by in-browser key translation Myrto Arapinis Sergiu Bursuc Mark Ryan School of Computer Science, University of Birmingham

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2013-12-10 12:32:46
      3

      Hydraulophone Design Considerations: Absement, Displacement, and Velocity-Sensitive Music Keyboard in which each key is a Water Jet Steve Mann, Ryan Janzen, Mark Post University of Toronto, Dept. of Electrical and Compu

      Add to Reading List

      Source URL: www.eyetap.org

      - Date: 2007-01-24 01:42:40
        4American football / Crime / National Football League / O. J. Simpson robbery case / O. J. Simpson / Beardsley

        RB lawyers represent key player in Simpson case The two-man firm of Mark Haushalter and Ryan Okabe are the attorneys for Tom Riccio, the man who taped the incident in the hotel room. By Denise Nix Staff Writer For most a

        Add to Reading List

        Source URL: www.lasvegascrimelawyer.com

        Language: English - Date: 2008-08-29 00:46:49
        5Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

        Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

        Add to Reading List

        Source URL: cacr.uwaterloo.ca

        Language: English - Date: 2011-07-10 02:35:14
        6Public-key cryptography / Identity management / Public key infrastructure / Key management / Cryptography / Privacy-enhancing technologies / Pseudonymity / Authentication / Blacklist / User / Internet privacy / Anonymity

        Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

        Add to Reading List

        Source URL: homes.soic.indiana.edu

        Language: English - Date: 2016-05-12 20:00:31
        7Public-key cryptography / Cryptography / Notary / Financial cryptography / E-commerce / Blind signature / Digital signature / Zero-knowledge proof / Proof of knowledge / Anonymity / Proxy server / Authentication

        Making a Nymbler Nymble using VERBS? Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,k2henry,iang}@cs.uwaterloo.ca

        Add to Reading List

        Source URL: homes.soic.indiana.edu

        Language: English - Date: 2016-05-12 20:00:31
        8Databases / NoSQL / Transaction processing / Data management / Hekaton / Latency / RocksDB / Online transaction processing

        Lightning  Performance  in  a     Non-­‐Main-­‐Memory   Transac6onal  Key-­‐Value  Store David  Lomet   With   Jus)n  Levandoski,  Sudipta  Sengupta,  Ryan  Stutsman,  and  

        Add to Reading List

        Source URL: hpts.ws

        Language: English - Date: 2015-10-02 08:08:42
        9

        Using Scope Judgments to! Locate the Only head in Korean ! Dennis Ryan Storoshenko! ! 1. KEY CLAIM!

        Add to Reading List

        Source URL: people.ucalgary.ca

        Language: English - Date: 2013-07-24 16:03:08
          10Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Public key infrastructure / Alternative currencies / Bitcoin / Public key certificate / Digital signature / Key / Multisignature / CryptoNote

          Smart Signatures A White Paper from Rebooting the Web of Trust by Christopher Allen, Greg Maxwell, Peter Todd, Ryan Shea, Pieter Wuille, Joseph Bonneau, Joseph Poon, and Tyler Close

          Add to Reading List

          Source URL: www.weboftrust.info

          Language: English - Date: 2016-06-08 16:57:37
          UPDATE