Cryptography Research

Results: 540



#Item
91Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Name server / DNS spoofing / DNS hijacking

MSc System and Network Engineering Research Project II Discovery method for a DNSSEC validating stub resolver

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2015-08-24 06:37:35
92Operations research / Combinatorial optimization / Cryptography / Knapsack problem / Email spam / Bloom filter

WORKSHOP ON WEB PERSONALIZATION, RECOMMENDER SYSTEMS AND SOCIAL MEDIA, Spoilers Ahead - Personalized Web Filtering Pascal Bissig, Philipp Brandes, Roger Wattenhofer, Roman Willi

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-09-28 10:26:13
93

Formal verification of quantum cryptography Dominique Unruh University of Tartu Abstract. Formal verification of cryptographic protocols has been an active research area for several decades, mostly in idealized symbolic

Add to Reading List

Source URL: software.imdea.org

- Date: 2015-07-09 06:40:16
    94

    Advances in the Side-Channel Analysis of Symmetric Cryptography Mostafa Taha July 3, 2014 This research was supported in part by the VT-MENA program of Egypt, and by the NSF grant no.

    Add to Reading List

    Source URL: ecewp.ece.wpi.edu

    Language: English - Date: 2014-07-07 09:21:49
      95

      PhD Position: Cryptography secured against side-channel attacks COSIC, KU Leuven The Computer Security and Industrial Cryptography group (COSIC) currently has over 55 researchers. The research work of COSIC covers a broa

      Add to Reading List

      Source URL: homes.esat.kuleuven.be

      Language: English - Date: 2015-09-08 07:48:14
        96Computing / Internet of Things / Ambient intelligence / Cryptography / Constrained Application Protocol / Internet privacy / Computer security / Bluetooth / Big data / Cloud computing / Privacy / Communications protocol

        ESORICS 2015 Program Guide 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

        Add to Reading List

        Source URL: esorics2015.sba-research.org

        Language: English - Date: 2015-09-22 04:00:14
        97

        Gregory Neven, IBM Research – Zurich Cryptography summer school, July 21-24, 2014, Bucharest Digital signatures I © 2014 IBM Corporation

        Add to Reading List

        Source URL: www.cs.bris.ac.uk

        Language: English - Date: 2014-07-22 05:02:06
          98Computing / Internet / Cryptography / Internet privacy / Onion routing / Routing / Tor / Universal composability / Anonymity / Proxy server / IP / Posterior probability

          A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

          Add to Reading List

          Source URL: ohmygodel.com

          Language: English - Date: 2012-07-09 20:58:21
          99Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Privacy / Medical privacy

          Thank you for the opportunuty to submit evidence to inform the Royal Society’s Cybersecurity research project. I am writing today on my own behalf to draw attention to an easily overlooked set of problems in cybersecu

          Add to Reading List

          Source URL: adam.shostack.org

          Language: English - Date: 2014-06-11 12:06:03
          100

          Gregory Neven, IBM Research – Zurich Cryptography Summer School, July 21-24, 2014, Bucharest Digital signatures II © 2009 IBM Corporation

          Add to Reading List

          Source URL: www.cs.bris.ac.uk

          Language: English - Date: 2014-07-23 03:42:07
            UPDATE