Whitfield Diffie

Results: 59



#Item
21Two novel applications of bilinear groups to ABE encryption Riccardo Longo  Department of Mathematics, University of Trento, Italy Chiara Marcolla  Department of Mathema

Two novel applications of bilinear groups to ABE encryption Riccardo Longo Department of Mathematics, University of Trento, Italy Chiara Marcolla Department of Mathema

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-12 11:38:03
22draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

draft-vanrein-krb5-kdh-00 - KRB5-KDH: Cryptographically binding Kerberos5 with Diffie-Hellman

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-26 16:01:52
23F-Response Now Cloud Service Privacy and Security Summary  PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote

F-Response Now Cloud Service Privacy and Security Summary PRIVACY AND SECURITY SUMMARY PRIVACY F-Response Now instances (“Now Instances”) leverage a number of design decisions to greatly reduce or eliminate the pote

Add to Reading List

Source URL: www.f-response.com

Language: English - Date: 2014-11-03 13:25:55
24Communication & Network Security  DigiSAFE LinkCrypt Reliable and Transparent Link Security

Communication & Network Security DigiSAFE LinkCrypt Reliable and Transparent Link Security

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:05:31
25EPIC UNCHR ltr[removed]

EPIC UNCHR ltr[removed]

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:17
26VME Cell  TM VME Cell combines three layers of security in order to provide a completely secured Connection:

VME Cell TM VME Cell combines three layers of security in order to provide a completely secured Connection:

Add to Reading List

Source URL: www.meganet.com

Language: English - Date: 2014-10-24 18:00:57
27DELARAM KAHROBAEI, City University of New York, City Tech and Graduate Center Public key exchange using extensions by endomorphisms and matrices over a Galois field I am presenting a joint work with H.T.Lam and V.Shpilra

DELARAM KAHROBAEI, City University of New York, City Tech and Graduate Center Public key exchange using extensions by endomorphisms and matrices over a Galois field I am presenting a joint work with H.T.Lam and V.Shpilra

Add to Reading List

Source URL: cms.math.ca

Language: English - Date: 2013-11-01 09:18:01
28A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
29Encryption Product Portfolio
[removed]Encryption Product Portfolio

Encryption Product Portfolio [removed]Encryption Product Portfolio

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-06-06 03:19:32
30Microsoft Word - ASA-SM  Security Policy.doc

Microsoft Word - ASA-SM Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-17 10:33:44