Cryptography Research

Results: 540



#Item
141Peer-to-peer computing / Law / Financial cryptography / Electronic commerce / Australian Securities Exchange / Electronic money / Law of agency / Business / Payment systems / Bitcoin

Microsoft WordDCC Research Report Released - FINAL.docx

Add to Reading List

Source URL: stage.digitalbtc.com

Language: English - Date: 2015-01-27 10:09:54
142Quantum information science / Quantum cryptography / Canada Research Chairs / Quantum key distribution / Institute for Quantum Computing / Secure Communication based on Quantum Cryptography / Michele Mosca / Quantum computer / Centre for Applied Cryptographic Research / Cryptography / Quantum mechanics / Theoretical computer science

Quantum-Safe-Crypto Workshop Programme Committee - Biographies Charles BROOKSON, ETSI OCG Security Chairman Charles worked recently in the Department for Business, Innovation and Skills of the United Kingdom Government f

Add to Reading List

Source URL: docbox.etsi.org

Language: English - Date: 2013-09-25 02:21:27
143Economics of security / Mesh networking / Wireless network / Center for Advanced Security Research Darmstadt / Wireless networking / Technology / Wireless sensor network

CLEARER: Security and Privacy Research Roadmap for the CrySyS Lab Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth Laboratory of Cryptography and System Security (CrySyS) Budapest University of Technology and E

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:23:56
144

Gregory Neven Reseaerch Staff Member IMB Research – Zurich Dr. Gregory Neven is a research scientist at IBM Research – Zurich focusing on provably secure cryptography, privacy, and policy languages. Gregory holds a P

Add to Reading List

Source URL: www.trustindigitallife.eu

- Date: 2015-03-19 08:36:45
    145Zero-knowledge proof / Proof of knowledge / IP / Mathematical proof / Markov chain / Commitment scheme / Alice and Bob / Random oracle / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

    Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2012-06-02 16:07:22
    146Computer network security / Computer security / Cryptography standards / Secure communication / CRYPTREC / Cryptography / Information security / Network security / National Security Agency / Security / Crime prevention / National security

    Network Security Research Institute Organization of the Network Security Research Institute, NICT NICT

    Add to Reading List

    Source URL: nict.go.jp

    Language: English - Date: 2014-08-13 01:28:32
    147Mathematics / Mathematical sciences / Computer science / Computational mathematics / Computational science / Cryptography / Bioinformatics / UP Diliman Department of Computer Science / Applied mathematics / Science / Formal sciences

    Lampiran A10 MATHEMATICAL SCIENCES, INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH CLUSTER Head: PROF. DATO’ DR. KAMEL ARRIFIN MOHD ATAN Leading PTJ: Institute for Mathematical Research, Universiti Putra Malaysia,

    Add to Reading List

    Source URL: www.rmc.upm.edu.my

    Language: English - Date: 2014-04-21 21:47:14
    148Mathematics / Mathematical sciences / Computer science / Computational mathematics / Computational science / Cryptography / Bioinformatics / UP Diliman Department of Computer Science / Applied mathematics / Science / Formal sciences

    Lampiran A10 MATHEMATICAL SCIENCES, INFORMATION AND COMMUNICATION TECHNOLOGY RESEARCH CLUSTER Head: PROF. DATO’ DR. KAMEL ARRIFIN MOHD ATAN Leading PTJ: Institute for Mathematical Research, Universiti Putra Malaysia,

    Add to Reading List

    Source URL: www.tncpi.upm.edu.my

    Language: English - Date: 2013-12-10 03:21:05
    149Cryptographic protocols / Internet protocols / Authorization certificate / Revocation list / Public key certificate / X.509 / Privilege Management Infrastructure / Online Certificate Status Protocol / NP / Cryptography / Public-key cryptography / Key management

    PAMINA: A Certificate Based Privilege Management System Zoltán Nochta, Peter Ebinger and Sebastian Abeck University of Karlsruhe, Institute for Telematics, Cooperation and Management IT-Research Group Zirkel 2, 76128 Ka

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2002-02-11 23:36:07
    150Social engineering / Internet protocols / One-time password / Two-factor authentication / Password / Phishing / Transaction authentication number / Authentication / Man-in-the-middle attack / Security / Computer security / Cryptography

    CERIAS Tech ReportDefending against Password Exposure using Deceptive Covert Communication by Mohammed H. Almeshekah, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assura

    Add to Reading List

    Source URL: www.cerias.purdue.edu

    Language: English - Date: 2015-02-13 13:31:35
    UPDATE