Secure

Results: 29781



#Item
31Identity management / Computer access control / Computer security / Identity documents / Identity / Federated identity / Privacy / Personally identifiable information / Digital identity / Internet privacy / Namespace / Authentication

GLOBAL iD (GiD) BACKGROUND Every person has a right, and a responsibility, to a secure, trusted, and private identity. The prevalence of electronic connections implies that we each must identify ourselves to prove our a

Add to Reading List

Source URL: www.globalid.net

Language: English - Date: 2018-05-23 15:04:13
32Cryptography / Mathematics / Theoretical computer science / Computational complexity theory / Secret sharing / Quantum complexity theory / Secure multi-party computation / IP / PP / Polynomial / Communication complexity / Lagrange polynomial

Best of Both Worlds in Secure Computation, with Low Communication Overhead

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2018-08-09 16:19:58
33

Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
    34Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

    A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:26:03
    35Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

    DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

    Add to Reading List

    Source URL: itsec.cs.uni-bonn.de

    Language: English - Date: 2017-04-24 03:56:14
    36Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Digital currencies / Public-key cryptography / Mihir Bellare / SUF / RSA

    UNIVERSITY OF CALIFORNIA, SAN DIEGO Flexible Models for Secure Systems A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in

    Add to Reading List

    Source URL: smeiklej.com

    Language: English - Date: 2018-10-23 14:58:02
    37Computing / Computer architecture / Technology / Wireless networking / Smartphones / Bluetooth / Bluetooth Low Energy / Indoor positioning system / Restriction of Hazardous Substances Directive / Monitoring / Android

    MODsense TM An integrated and secure temperature monitoring solution. Qualified for monitoring medicinal product distribution.

    Add to Reading List

    Source URL: modum.io

    Language: English - Date: 2018-08-27 08:42:31
    38Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security

    CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien

    Add to Reading List

    Source URL: cryptojedi.org

    Language: English - Date: 2018-07-25 08:38:21
    39Logic gates / Cryptographic protocols / Circuit complexity / Theoretical computer science / Complexity classes / Garbled circuit / Theory of computation / Secure multi-party computation / Multiplexer / XOR gate / OR gate / NC

    Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

    Add to Reading List

    Source URL: acmccs.github.io

    Language: English - Date: 2017-12-30 21:51:59
    40Economy / Money / Finance / Corporate finance / Special-purpose entity / Legal entities / Offshore finance / Economy of the Republic of Ireland / Tax avoidance / Securitization / SPV / Asset-backed security

    Secure Securitisations in Malta Securitisation transactions in Malta, that is the raising of capital through the transfer of assets and risk from the transferee (“Originator”) to special purpose vehicles (“SPVs”)

    Add to Reading List

    Source URL: mfia.org.mt

    Language: English - Date: 2015-04-08 15:23:46
    UPDATE