CS-Cipher

Results: 180



#Item
111ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:20:46
112Zodiac / Code / Cryptography / Substitution cipher / Cipher

Decipherment with a Million Random Restarts Taylor Berg-Kirkpatrick Dan Klein Computer Science Division University of California, Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-09-20 16:21:13
113Computability theory / Theoretical computer science / Function / Logo / Recursion / Regular expression / Substitution cipher / CAL Actor Language / Computable function / Computer programming / Software engineering / Mathematics

11 Recursive Operations So far, the recursive procedures we’ve seen have all been commands, not operations. Remember that an operation is a procedure that has an output rather than an effect. In

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-12-25 21:47:54
114Matrix / Cipher / Cyberwarfare / Four-square cipher / Espionage / Applied mathematics / Two-square cipher / Playfair cipher / Substitution cipher / Cryptography

12 Example: Playfair Cipher Program file for this chapter: playfair

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2003-12-25 21:48:42
115Initialization vector / Probabilistic encryption / Ciphertext indistinguishability / Deterministic encryption / RSA / Disk encryption theory / Block cipher / Cipher / MapReduce / Cryptography / Homomorphic encryption / Paillier cryptosystem

MrCrypt: Static Analysis for Secure Cloud Computations Sai Deep Tetali Mohsen Lesani Rupak Majumdar

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2013-07-29 19:36:50
116Classical cipher / International Obfuscated C Code Contest / Computer programming / Linguistics / Computing

I d i x c ~ c ! i n ~ h cnorL!~cr-npartr o f iilabm:a t i ~ ~ d cS re c C i o n ?(i)

Add to Reading List

Source URL: digital.library.okstate.edu

Language: English - Date: 2006-05-20 18:57:33
117Cipher / RSA / Public-key cryptography / Chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Encryption / ID-based encryption

Copyright by Allison Bishop Lewko 2012 The Dissertation Committee for Allison Bishop Lewko

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-07-16 23:33:58
118Four-square cipher / Portable character set

Microsoft Word[removed]Workforce Plan Report.doc

Add to Reading List

Source URL: www.cs.ny.gov

Language: English - Date: 2005-07-14 15:30:15
119Classical cipher / Index of agriculture articles

[removed] 73 7  3 82 C5 DEAA<=9>FGHI9JJ C4 M:EW9JX[QWI9JJ

Add to Reading List

Source URL: www.sportakrobatik.de

Language: English - Date: 2009-05-21 02:13:47
120Software design pattern / Security Patterns / Communications security / Cipher / Cryptography / Cyberwarfare / Public-key cryptography

Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems Jan de Muijnck-Hughes and Ishbel Duncan School of Computer Science, University of St Andrews, St Andrews, Fife, UK

Add to Reading List

Source URL: ishbel.host.cs.st-andrews.ac.uk

Language: English - Date: 2012-05-23 07:42:19
UPDATE