Cryptographic protocol

Results: 1374



#Item
31Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
32An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
33Microsoft Word - Modulhandbuch-MI-esecurity-2012.doc

Microsoft Word - Modulhandbuch-MI-esecurity-2012.doc

Add to Reading List

Source URL: cosec.bit.uni-bonn.de

Language: English - Date: 2014-02-03 06:03:57
34Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
35Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2016-02-04 15:25:49
36Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2011-09-10 05:30:51
37The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

The TCPSniffer Table of contents 1 Starting the TCPSniffer................................................................................................ 2 2 Using the TCPSniffer as an HTTP proxy........................

Add to Reading List

Source URL: grinder.sourceforge.net

Language: English - Date: 2014-05-20 07:02:12
38Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
39Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari  Marcelo Bagnulo

Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

Add to Reading List

Source URL: irtf.org

Language: English - Date: 2015-10-29 00:54:14
40page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16