Cryptography Research

Results: 540



#Item
171RSA / United Kingdom / Public-key cryptography / British culture / Royal Society of Arts

Regional Studies Association Early Career Grant Scheme Midterm Activity Report The Midterm Activity Report should be submitted within 9 months of starting the research.

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2013-07-09 13:37:13
172Spamming / Phishing / Social engineering / Cryptography / Password / PayPal / Internet privacy / Malware / SiteKey / Security / Espionage / Computing

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users Cormac Herley Microsoft Research One Microsoft Way Redmond, WA, USA

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-12-18 17:40:50
173Surveillance / Access control / Keystroke dynamics / Password / Authentication / Password manager / Biometrics Institute / Security / Biometrics / Cryptography

Enhancing the Password Security with Keystroke Dynamics Christophe Rosenberger GREYC Research Lab - France

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-07 01:43:00
174Cryptographic hash functions / Computability theory / Random oracle / Oracle machine / Oracle Corporation / Proof of knowledge / L / Standard model / Oracle Database / Cryptography / Theoretical computer science / Cryptographic protocols

Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-18 23:51:34
175Pharmaceutical industry / Health / Design of experiments / Epidemiology / Cryptography / Clinical trial / Password / Digital signature / National Health and Medical Research Council / Clinical research / Science / Research

PDF Document

Add to Reading List

Source URL: ctc.usyd.edu.au

Language: English - Date: 2013-04-18 20:42:54
176British culture / Royal Society of Arts / RSA / Digital signature / Cryptography / Public-key cryptography / Key management

Regional Studies Association Early Career Grant Scheme End of Award Report The End of Award Report should be submitted within 6 weeks of completing the research.

Add to Reading List

Source URL: www.regionalstudies.org

Language: English - Date: 2013-07-09 13:37:13
177Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-09 05:51:53
178Steganalysis / Fisher information / Cryptography / Espionage / Steganography

Estimating Steganographic Fisher Information in Real Images Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2009-06-08 02:20:52
179Steganalysis / Steganography tools / BPCS-Steganography / Cryptography / Espionage / Steganography

Perturbation Hiding and the Batch Steganography Problem Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2008-05-19 15:35:41
180Joint Accreditation System of Australia and New Zealand / Public key certificate / Professional certification / Key management / Public-key cryptography / Standards

CERTIFICATE OF REGISTRATION Quality Management Systems INDIAN AGRICULTURAL STATISTICS RESEARCH INSTITUTE (Indian Council of Agricultural Research) Library Avenue, PUSA, New Delhi, India

Add to Reading List

Source URL: iasri.res.in

Language: English - Date: 2014-01-15 01:59:49
UPDATE