Secure transmission

Results: 298



#Item
1

International Journal of Control and Automation Vol. 6, No. 2, April, 2013 IOT Secure Transmission Based on Integration of IBE and PKI/CA Liu Yang1,2*, Peng Yu2, Wang Bailing1, Bai Xuefeng1, Yuan Xinling1 and Li Geng1 1

Add to Reading List

Source URL: www.sersc.org

- Date: 2013-04-24 23:55:35
    2Cryptography / Secure multi-party computation / Secret sharing / Public-key cryptography / Universal composability / Communications protocol / Cryptographic protocol / Cartesian coordinate system / Transmission Control Protocol / Secure two-party computation

    Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

    Add to Reading List

    Source URL: work.debayangupta.com

    Language: English - Date: 2014-06-25 08:00:47
    3Cryptography / Computer security / Bundesdatenschutzgesetz / German law / Secure transmission / Encryption / Medical privacy / Law

        Inform ation regarding the declaration of consent: ImpactDOCK Hamburg collects, processes, stores and uses the personal data provided by the immigrant based on the questionnaire. Disclosure of this information i

    Add to Reading List

    Source URL: impactdock.de

    Language: English - Date: 2016-07-29 08:37:09
    4Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security

    Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2004-07-28 23:00:33
    5Computing / Cryptography / Software engineering / Hypertext Transfer Protocol / Cryptographic protocols / Secure communication / E-commerce / Transmission Control Protocol / HTTPS / Password / HTTP cookie / OpenSSL

    Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
    6Computing / Cryptography / Internet / Secure communication / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Transport Layer Security / Cipher suite / Handshaking / Transmission Control Protocol

    Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-02-04 15:25:49
    7Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation

    A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    Language: English - Date: 2006-03-28 14:11:04
    8Cryptography / Cryptographic hash functions / Information theory / Secure multi-party computation / Transmission Control Protocol / Bandwidth / SHA-1 / Internet protocol suite / Computational complexity theory / Network performance

    Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

    Add to Reading List

    Source URL: www.fkerschbaum.org

    Language: English - Date: 2011-09-10 05:30:51
    9Wireless sensor network / Wireless networking / Computing / Wireless / Data transmission / Sensor node / ANT / Wireless ad hoc network / Routing / Computer network / Secure data aggregation in WSN / Mobile wireless sensor network

    Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Station Sameer Muftah Amar Asayh Department of Electronics and Communication J.K Institute of Applied Physics and Technology University of A

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-08 00:09:30
    10Computing / Network architecture / Internet / Network protocols / Internet Standards / Internet protocols / Cryptographic protocols / Secure communication / Transport Layer Security / Transmission Control Protocol / Clientserver model / Session

    Microsoft Word - IBSS&K Engineering.doc

    Add to Reading List

    Source URL: foibg.com

    Language: English - Date: 2015-02-02 08:46:10
    UPDATE