Cryptographic engineering

Results: 331



#Item
191Cryptographic protocols / Technology / Computing / Wireless security / Telecommunications engineering / Wi-Fi / Wireless network / Wired Equivalent Privacy / Wireless distribution system / Computer network security / Wireless networking / IEEE 802.11

Internet Radio INSTRUCTION MANUAL Rev[removed] c

Add to Reading List

Source URL: www.ccrane.com

Language: English - Date: 2014-03-27 12:26:52
192Crime prevention / National security / Computer network security / Trusted system / Cryptographic hash function / Cryptographic engineering / XTS-400 / Security / Cryptography / Computer security

A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne This thesis is presented for the

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2011-02-17 01:18:57
193Merkle–Damgård construction / Padding / Hash function / SHA-1 / MD4 / MD5 / SHA-2 / Preimage attack / Keccak / Cryptographic hash functions / Error detection and correction / Cryptography

Revisiting Dedicated and Block Cipher based Hash Functions Anupam Pattanayak Computer Science & Engineering Department, Haldia Institute of Technology, Haldia, India – 721657, E-mail – [removed] Abstract:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-06 05:29:27
194Elliptic curve cryptography / Cryptographic protocols / Key size / Diffie–Hellman key exchange / Elliptic curve / Elliptic Curve DSA / Whitfield Diffie / ECC patents / Elliptic curve Diffie–Hellman / Cryptography / Finite fields / Public-key cryptography

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography David J. Malan, Matt Welsh, Michael D. Smith Division of Engineering and Applied Sciences Harvard University {malan,mdw,smit

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-08-24 12:30:22
195Wireless networking / Computer network security / Cryptographic protocols / Electronic engineering / Linux-based devices / IEEE 802.11 / Home network / Wireless LAN / Linksys / Wi-Fi / Computing / Technology

DIR-300_B1_Datasheet_(01)(W).indd

Add to Reading List

Source URL: ftp.dlink.eu

Language: English
196Internet Key Exchange / Diffie–Hellman key exchange / Elliptic curve cryptography / Hellman / Key size / Request for Comments / XTR / Oakley protocol / Cryptography / Cryptographic protocols / Finite fields

Internet Engineering Task Force (IETF) Request for Comments: 5903 Obsoletes: 4753 Category: Informational ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-06-11 19:22:25
197Trusted computing / Cryptography / Trusted Platform Module / Cryptographic software / Direct Anonymous Attestation / Trusted Computing Group / Cloud computing / Virtual machine / VirtualBox / Software / System software / Computer security

The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

Add to Reading List

Source URL: dar.aucegypt.edu

Language: English - Date: 2015-01-15 17:00:14
198Electronic engineering / OpenCL / Field-programmable gate array / Altera / Parallel computing / MD5 / Kernel / Password cracking / Brute-force attack / GPGPU / Computing / Software

FPGA performances in Cryptography Performance analysis of different cryptographic algorithms implemented in an FPGA Final Report Lubos Gaspar

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2015-01-23 20:51:10
199Technology / Cryptographic protocols / Network access / Electronic engineering / Wi-Fi / Service set / Wireless access point / Computing / Wireless networking / Computer network security / IEEE 802.11

Order Registration for operating an exhibitor’s own WiFi Access-Point at the stand Deadline for return: [removed]Please send your fax reply to:

Add to Reading List

Source URL: book-fair.com

Language: English - Date: 2014-09-03 07:30:13
200Internet protocols / Computing / Telecommunications engineering / Cryptographic protocols / Authenticator / Computer network security / Google Authenticator

FIDO UAF Registry of Predefined Values FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps[removed]/fido-uaf-reg-v1.0-ps20141208.html Previous version: https

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-08 17:39:28
UPDATE