Cryptographic engineering

Results: 331



#Item
51Master System & Network Engineering  Securing the last mile of DNS with CGA-TSIG Research Project 2  Supervisors:

Master System & Network Engineering Securing the last mile of DNS with CGA-TSIG Research Project 2 Supervisors:

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2014-01-08 04:14:49
52Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
53   NOIN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

  NOIN THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT BENJAMIN JOFFE, et al.,

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-04-02 11:35:58
54Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos  Dept. of Electrical and Computer Engineering

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
55Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Phishing with Super Bait Jeremiah Grossman WhiteHat Security Founder and Chief Technology Officer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
56VISA DATA SECURITY BULLETIN  9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

VISA DATA SECURITY BULLETIN 9 September 2010 Wireless Networks Requires Data Security Controls Merchants that have implemented or are considering using wireless technology must develop and deploy

Add to Reading List

Source URL: en.chasepaymentech.ca

Language: English - Date: 2015-05-28 10:12:02
57Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-09-01 08:58:29
58Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Lecture 14: Elliptic Curve Cryptography and Digital Rights Management Lecture Notes on “Computer and Network Security” by Avi Kak () April 23, :55am

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-23 00:56:33
59Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 7230 Obsoletes: 2145, 2616 Updates: 2817, 2818 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:14:27
60Authenticating Primary Users’ Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures Yao Liu, Peng Ning Department of Computer Science North Carolina State University Raleigh, NC

Authenticating Primary Users’ Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures Yao Liu, Peng Ning Department of Computer Science North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14