Shared secret

Results: 29



#Item
11Cryptographic protocols / Key management / Secret sharing / Time complexity / Algorithm / Polynomial / XTR / Theoretical computer science / Applied mathematics / Mathematics

Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 08:21:27
12Key management / Cyberwarfare / Kerberos / Key distribution center / Single sign-on / Ticket Granting Ticket / Ticket / Authentication / Shared secret / Cryptography / Computer network security / Computer security

Cross-realm Kerberos implementations Esan Wit Esan.Wit at os3.nl Mick Pouw Mick.Pouw at os3.nl

Add to Reading List

Source URL: realm-xover.arpa2.net

Language: English - Date: 2014-10-11 16:09:30
13Key / Shared secret / E0 / Cryptography / Key management / Public-key cryptography

Distributed Snapshots Assume: active monitoring: p0 requests state info FIFO channels Each process records its local state and the states of all its incoming channels

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2007-04-11 12:16:46
14Confidentiality / Journalism sourcing / Trade secret / Non-disclosure agreement / Secrecy / Intellectual property law / Ethics

MUTUAL CONFIDENTIALITY ARRANGEMENT AND COMMITMENT NOT TO PUBLICLY DISCLOSE NON-PUBLIC INFORMATION SHARED

Add to Reading List

Source URL: www.fda.gov

Language: English
15Health economics / Health / Business / Healthcare reform / Marketing / Mystery shopping / Surveillance

AHA Secret Shopper Exercise T his exercise enables hospital leaders to get a shared sense of the challenges consumers face in trying to access hospital price information. 

Add to Reading List

Source URL: www.ahacommunityconnections.org

Language: English - Date: 2014-07-24 14:56:16
16Substance abuse / Mental health / Substance-related disorders / Drug addiction / Public health / Mental disorder / Penal system of Japan / Substance Abuse and Mental Health Services Administration / Substance use disorder / Psychiatry / Medicine / Health

Adults with Behavioral Health Needs under Correctional Supervision: A Shared Framework for Reducing Recidivism and Promoting Recovery It’s no secret that the majority of people churning

Add to Reading List

Source URL: csgjusticecenter.org

Language: English - Date: 2013-08-19 18:50:25
17Password / Automated teller machine / Shared secret / Computer security / Cryptography / Technology / Passphrase

Cylink ATM Encryptor FIPS[removed]Security Policy ECO, Date, and Revision History Rev A, DO-025, [removed], jvv Rev B, DO-030, [removed], RGB

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
18Password / Automated teller machine / Shared secret / Computer security / Cryptography / Technology / Passphrase

Cylink ATM Encryptor FIPS[removed]Security Policy ECO, Date, and Revision History Rev A, DO-025, [removed], jvv Rev B, DO-030, [removed], RGB

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
19Password / Automated teller machine / Shared secret / Computer security / Cryptography / Technology / Passphrase

Cylink ATM Encryptor FIPS[removed]Security Policy ECO, Date, and Revision History Rev A, DO-025, [removed], jvv Rev B, DO-030, [removed], RGB

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
20Password / Automated teller machine / Shared secret / Computer security / Cryptography / Technology / Passphrase

Cylink ATM Encryptor FIPS[removed]Security Policy ECO, Date, and Revision History Rev A, DO-025, [removed], jvv Rev B, DO-030, [removed], RGB

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE