Crypto

Results: 1625



#Item
241Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
242Cryptography / Modular arithmetic / Zero-knowledge proof / Quadratic residue / RSA / FeigeFiatShamir identification scheme / IP / Public-key cryptography

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
243Graph theory / NP-complete problems / Hamiltonian path / Cycle / Hamiltonian / Zero-knowledge proof / Hamiltonian path problem

Cryptographic Protocols Spring 2015 Slides for Chapter 1 (6th lecture) Hamiltonian cycles

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-03-30 06:00:41
244Anonymity / Digital media / Cryptography / World Wide Web / Crypto-anarchism / Pseudonymity / Blog / Anonymous blog / ScienceBlogs

Cites & Insights Crawford at Large/Online Edition Libraries • Policy • Technology • Media Volume 12, Number 8: September 2012

Add to Reading List

Source URL: citesandinsights.info

Language: English - Date: 2012-08-14 11:05:55
245Computing / Cloud computing / Computer security / Cloud infrastructure / Cloud storage / Data security / Cloud computing security / Information security / Cloud Security Alliance / Data center / Cloud computing issues / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:59
246Computer network security / Computing / Virtual private networks / Computer architecture / Software / Network architecture / Internet privacy / Crypto-anarchism / Internet Connect / Point and click / SoftEther VPN / OpenVPN

Configure a VPN connection in Mac OS X The following guide is based on an English OS X Leopardbut with minor modifications the approach should work for other versions of OS X as well (For some versions it might b

Add to Reading List

Source URL: www.soc.ku.dk

Language: English - Date: 2016-08-22 10:32:30
247Computing / Cloud computing / Cloud infrastructure / Cloud storage / Cloud computing security / Computer security / Cloud Security Alliance / Distributed file system for cloud / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-09 08:47:09
248Computer network security / Computing / Virtual private networks / Computer architecture / Computer security / Tunneling protocols / Network architecture / Crypto-anarchism / OpenVPN / Windows Registry / Windows XP / SoftEther VPN

ITSC Services User Guide – VPN - For Windows XP Users VPN - For Windows XP Users Step 1. Click Start, and then click Control Panel on the

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-07 04:32:13
249Cryptography / Cryptographic hash functions / One-way compression function / Block cipher / SHA-1 / Hash function

An abridged version, reference [2], appears as Advances in Cryptology – CRYPTO ’02, Lecture Notes in Computer Science, Vol. ????, M. Yung, ed., Springer-Verlag. This is the full version. Black-Box Analysis of the Blo

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2002-06-04 14:04:18
250Cryptography / Computational complexity theory / Theory of computation / Complexity classes / Probabilistic complexity theory / Public-key cryptography / NP / IP / Proof of knowledge / Zero-knowledge proof / Random oracle / FiatShamir heuristic

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
UPDATE