Crypto

Results: 1625



#Item
971Combinatorics / Abstract algebra / Permutation / Verifiable secret sharing / Advantage / Mix network / Parity of a permutation / Mathematics / Permutations / Cryptography

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks Philippe Golle PARC [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-05-24 20:30:54
972Internet marketing / Online advertising / Advertising network / Behavioral targeting / Advertising / DoubleClick / NebuAd / Click fraud / HTTP cookie / Internet / Computing / Internet privacy

Adnostic: Privacy Preserving Targeted Advertisingāˆ— Vincent Toubiana Arvind Narayanan Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-12-20 15:46:46
973Computer network security / Broadband / Internet privacy / Crypto-anarchism / Virtual private network / Voice over IP / Internet / Internode / Router / Computing / Network architecture / Electronics

Product Information: Internode Business Connect vs VPN

Add to Reading List

Source URL: www.internode.on.net

Language: English - Date: 2012-08-30 01:42:53
974Logic / Natural language processing / Computational linguistics / Formal sciences / Expert systems / Inference / Knowledge representation and reasoning / Association rule learning / Information retrieval / Science / Knowledge / Reasoning

Detecting Privacy Leaks Using Corpus-based Association Rules Richard Chow Philippe Golle

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-06-24 18:58:26
975RSA / Commitment scheme / Cyberwarfare / Applied mathematics / Security / Electronic commerce / Public-key cryptography / Cryptography

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-01-04 13:22:38
976RSA / Commitment scheme / Cyberwarfare / Applied mathematics / Security / Electronic commerce / Public-key cryptography / Cryptography

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
977Advanced Encryption Standard / Key management / Special purpose file systems / Encrypting File System / AES implementations / Cryptography / Disk encryption / Cryptographic software

With the attached patch[removed]patch) we introduce transparent encryption for HFiles and the WAL for consideration. This work builds on a crypto codec framework to be submitted to the Hadoop Common and MapReduce projects.

Add to Reading List

Source URL: issues.apache.org

Language: English
978Modular arithmetic / Public-key cryptography / Finite fields / Integer factorization algorithms / RSA / Euclidean algorithm / Prime number / Discrete logarithm / Chinese remainder theorem / Abstract algebra / Mathematics / Cryptography

Cryptography and Computer Security CS255 Basic number theory fact sheet Part II: Arithmetic modulo composites

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-01-03 18:17:27
979

CS255: Winter 2009 PRPs and PRFs 1. Abstract ciphers:

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-25 22:18:32
    980Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

    CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2005-01-04 13:22:38
    UPDATE