The Adversary

Results: 500



#Item
71Cipher / Symmetric-key algorithm / Digital signature / Commitment scheme / Key generation / Key size / Key / RSA / Initialization vector / Cryptography / Key management / Public-key cryptography

Chapter 1 Introduction Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:40:23
72Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
73Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
74Monogenēs / Christianity / Religion / Christian soteriology / Theology / Christian eschatology / Religious views on love / love / John 3:16

Bible For Today Baptist Church Prisoner Prayer Letter February 2015 — Issue 8 “Be sober, be vigilant; because your adversary the devil, as a roaring lion, walketh about, seeking whom he

Add to Reading List

Source URL: biblefortoday.org

Language: English - Date: 2015-02-27 14:20:16
75Cryptographic protocols / Object-oriented programming / Communications protocol / Data transmission / Protocols / Trusted system / Cryptography / Universal composability / Computer security / Computing / Security / Data

On Adversary Models and Compositional Security Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia and Dilsun Kaynar Carnegie Mellon University Abstract We present a representative development in the science of security

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
76Business / Stern v. Marshall / Bankruptcy / Insolvency / United States bankruptcy court / Subordination / Adversary proceeding in bankruptcy / Chapter 11 /  Title 11 /  United States Code / Article One of the United States Constitution / Law / United States bankruptcy law / Government

Pratt’s Journal of Bankruptcy Law Volume 8 Number 8

Add to Reading List

Source URL: www.cooley.com

Language: English - Date: 2013-08-09 02:01:16
77Adversary proceeding in bankruptcy / United States bankruptcy court / Chapter 13 /  Title 11 /  United States Code / Summons / Federal Rules of Bankruptcy Procedure / Lawsuit / Chapter 7 /  Title 11 /  United States Code / Federal Rules of Civil Procedure / United States bankruptcy law / Law / Bankruptcy

Amendments to the Federal Rules of Bankruptcy Procedure Effective December 1, 2014 Amendments to the Federal Rules of Bankruptcy Procedure were approved by the Judicial Conference at its September 2013 session, and subse

Add to Reading List

Source URL: www.gasb.uscourts.gov

Language: English - Date: 2014-10-28 14:08:24
78Online law databases / Legal procedure / Legal documents / PACER / CM/ECF / Filing / Adversary proceeding in bankruptcy / Docket / Complaint / Law / Legal terms / Judicial branch of the United States government

[removed]CM/ECF LIVE DATABASE U.S. Bankruptcy Court Northern District of New York (Utica)

Add to Reading List

Source URL: metrocosm.com

Language: English - Date: 2015-04-08 15:08:12
79Windows Server / Windows NT / Windows XP / Windows Vista / Windows / Event Viewer / Group Policy / Active Directory / Management features new to Windows Vista / Microsoft Windows / Software / System software

Spotting the Adversary with Windows Event Log Monitoring

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-08 13:54:30
80SINR / Telecommunications engineering / Communications protocol / ANT / Adversary / Media access control / Wireless networking / Data / Information / Noise

Project Summary This three-year proposal on “Adversarial Models for Wireless Communication” is submitted to the NSF CCF-AF program, under the direction of Dr. Tracy Kimbrel, by Andr´ea W. Richa, Arizona State Univer

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2010-12-16 01:02:37
UPDATE