Vector Security

Results: 220



#Item
51nyssa_logo_vector_color562

nyssa_logo_vector_color562

Add to Reading List

Source URL: www.nyssa.org

Language: English - Date: 2012-11-13 14:50:55
52Routing and Security in Vehicular Networking Routing and Security in Vehicular Networking Di Yan, diyan at go.wustl.edu (A paper written under the guidance of Prof. Raj Jain)

Routing and Security in Vehicular Networking Routing and Security in Vehicular Networking Di Yan, diyan at go.wustl.edu (A paper written under the guidance of Prof. Raj Jain)

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2013-12-20 19:02:15
53Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
54COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
55The path to success is not a single vector from the current status Artist: Nathanael Kang, Malaysia 3

The path to success is not a single vector from the current status Artist: Nathanael Kang, Malaysia 3

Add to Reading List

Source URL: www.iwmi.cgiar.org

Language: English - Date: 2013-07-05 15:56:04
56A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
57Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
58A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
59Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo  May 13, 2011

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
60Justifying Security Spending

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38