Cryptographic engineering

Results: 331



#Item
41Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 5 Cryptography

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
42Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee Department of Computer Science & Engineering The Chinese University of Hong Kong

Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee Department of Computer Science & Engineering The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-11 06:27:45
43CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

CTC Financial Vote List 2.5 Highway Financial Matters March 26, 2015

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2015-03-13 16:20:11
44Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 2 Protocols

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 2 Protocols

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-23 11:43:55
45Anupam Das  Curriculum Vitae Contact Information

Anupam Das Curriculum Vitae Contact Information

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-01 15:23:20
46CHAPTER  2 Usability and Psychology Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy

CHAPTER 2 Usability and Psychology Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:38:22
47Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
48Collusion-Resistant Query Anonymization for Location-Based Services Qin Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, Arizona Email: {qinzhang, llazos}@email.arizona.

Collusion-Resistant Query Anonymization for Location-Based Services Qin Zhang and Loukas Lazos Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, Arizona Email: {qinzhang, llazos}@email.arizona.

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2014-03-17 19:34:15
49Internet Engineering Task Force (IETF) Request for Comments: 5863 Category: Informational ISSN: T. Hansen

Internet Engineering Task Force (IETF) Request for Comments: 5863 Category: Informational ISSN: T. Hansen

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-05-27 14:26:10
50The Grad Toolkit  Tips and Tricks for Success in Graduate School Gurdas Sandhu Dept. of Civil, Construction, and Environmental Engineering

The Grad Toolkit Tips and Tricks for Success in Graduate School Gurdas Sandhu Dept. of Civil, Construction, and Environmental Engineering

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2014-06-29 21:17:11