1![Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins](https://www.pdfsearch.io/img/fe00183e95a4dee2773828f3e7afefdc.jpg) | Add to Reading ListSource URL: vialab.science.uoit.caLanguage: English - Date: 2015-09-22 16:31:59
|
---|
2![Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1 Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1](https://www.pdfsearch.io/img/4a0a9f3f0e275e9e4ffddcbb08591bad.jpg) | Add to Reading ListSource URL: www-users.cs.umn.eduLanguage: English - Date: 2013-12-12 23:20:54
|
---|
3![PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres](https://www.pdfsearch.io/img/08bbc58a0e17b31f9b8d2b4f5928a4e2.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-12-09 05:42:43
|
---|
4![. . Security Reductions of Cryptographic Hash Functions . . . Security Reductions of Cryptographic Hash Functions .](https://www.pdfsearch.io/img/c1edeecc10597cac40d8952de33aa121.jpg) | Add to Reading ListSource URL: www1.spms.ntu.edu.sgLanguage: English - Date: 2011-08-31 02:03:42
|
---|
5![. . Security Reductions of Cryptographic Hash Functions . . . Security Reductions of Cryptographic Hash Functions .](https://www.pdfsearch.io/img/b2a89ad81adde005c18b86c309a86d01.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-03-13 12:15:13
|
---|
6![Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia](https://www.pdfsearch.io/img/4d5c48f512f267c00cb9d2b2ed75f7a5.jpg) | Add to Reading ListSource URL: web.spms.ntu.edu.sgLanguage: English - Date: 2012-08-24 06:11:58
|
---|
7![Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland](https://www.pdfsearch.io/img/64e46b61372fc871de54f0ffa8d6f8f6.jpg) | Add to Reading ListSource URL: www.easycrypt.infoLanguage: English - Date: 2015-06-04 11:02:41
|
---|
8![1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+ 1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+](https://www.pdfsearch.io/img/dc6b903ddb427c41c634b295b49970c7.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-05-19 23:15:34
|
---|
9![Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G Formally Certifying the Security of Digital Signature Schemes Santiago Zanella B´eguelin Benjamin Gr´egoire INRIA Sophia Antipolis - M´editerran´ee Microsoft Research - INRIA Joint Centre {Santiago.Zanella,Benjamin.G](https://www.pdfsearch.io/img/2f108af89dd2bfb684c95a957dcd7f9a.jpg) | Add to Reading ListSource URL: certicrypt.gforge.inria.frLanguage: English |
---|
10![ICH M2 EWG Work Plan 13 March 2015 Topic Adopted: 1994 Last Face-to-Face Meeting: Lisbon, November 2014 The following roles and responsibilities of M2 were approved by the SC: 1) Provide overview of ICH and SDO technical ICH M2 EWG Work Plan 13 March 2015 Topic Adopted: 1994 Last Face-to-Face Meeting: Lisbon, November 2014 The following roles and responsibilities of M2 were approved by the SC: 1) Provide overview of ICH and SDO technical](https://www.pdfsearch.io/img/3708df69cb52588ace54fa47130ac9e5.jpg) | Add to Reading ListSource URL: www.ich.orgLanguage: English - Date: 2015-04-02 02:41:29
|
---|