Cryptography Research

Results: 540



#Item
151Identity / Public-key cryptography / Cryptographic protocols / Electronic commerce / X.509 / IBM / Credential / OpenID / Security Assertion Markup Language / Cryptography / Identity management / Computing

Features and concepts of Privacy-ABCs Gregory Neven, IBM Research – Zurich © 2014 IBM Corporation

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:40:38
152Failure / Mix network / Cypherpunk / Cascades / MIX / Cascade Range / Reliability engineering / Systems engineering / Systems science / Internet privacy / Anonymous remailer / Cryptography

Reliable MIX Cascade Networks through Reputation Roger Dingledine, Reputation Technologies Paul Syverson, Naval Research Lab 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2007-02-09 23:47:33
153Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 11:29:28
154IGO / Go / Variable / Software engineering / Mathematics / Computing / Cryptography / Spreadsheet / Code

Changes Based on Research (All made to IGO‐level data)  1.  Changed death variables for SRDO to reflect it is still alive.  (5/17)  2. Determined 340 still exists.  Changed death info and

Add to Reading List

Source URL: www.correlatesofwar.org

Language: English - Date: 2015-05-28 02:26:20
155Dynamic programming / Combinatorial optimization / Cryptography / Knapsack problem / Operations research / Algorithm / Baby-step giant-step / Ordinal arithmetic / Mathematics / Theoretical computer science / Applied mathematics

CCCG 2007, Ottawa, Ontario, August 20–22, 2007 Fast Additive Constant Approximation Algorithms for The Safe Deposit Boxes Problem with Two and Three Currencies Boaz Ben-Moshe∗

Add to Reading List

Source URL: cccg.ca

Language: English - Date: 2008-10-28 21:30:52
156Interference / Randomness / Cryptography / Patterns / Speckle pattern / Entropy / Security token / Key size / Scattering / Physics / Geometry / Coding theory

RESEARCH ARTICLES 25. M. R. Singleton, D. B. Wigley, J. Bacteriol. 184, J. M. Caruthers, D. B. McKay, Curr. Opin. Struct. Biol. 12, J. P. Abrahams, A. G. Leslie, R. Lutter, J. E. Walker,

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:01
157Applied mathematics / Combinatorial optimization / Cryptography / Dynamic programming / Knapsack problem / Mathematical optimization / Optimization problem / Recommender system / Theoretical computer science / Computational complexity theory / Operations research

The 118th RCKC Colloquium Search Result Diversification via Filling up Multiple Knapsacks Yu Haitao

Add to Reading List

Source URL: www.tsukuba.ac.jp

Language: English - Date: 2014-12-09 20:27:32
158Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
159Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
160Online law databases / Legal research / Cryptography / LexisNexis / Open source intelligence / Authentication / Identity document / Security / Law / Reed Elsevier

LexisNexis Update 26 September, 2013 About LexisNexis Building on the 30+ year LexisNexis tradition, LexisNexis leverages

Add to Reading List

Source URL: support.barsnet.com

Language: English - Date: 2013-10-01 15:12:58
UPDATE