Cryptography Research

Results: 540



#Item
181Security / Authentication server / Cryptography / Cyberwarfare / Cognitive password / Password manager / Password / Computer security / Crypt

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon () Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-11-15 15:54:59
182Estimation theory / Statistics / Steganalysis / Maximum likelihood / Likelihood function / Cryptography / Espionage / Steganography

A Fusion of Maximum Likelihood and Structural Steganalysis Andrew Ker Royal Society University Research Fellow Oxford University Computing Laboratory

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2007-06-21 11:34:06
183Research / Science / Clinical trial / Electronic signature / Pharmaceutical sciences / Clinical research / Password / Cryptography

PDF Document

Add to Reading List

Source URL: ctc.usyd.edu.au

Language: English - Date: 2014-06-29 21:06:36
184Code division multiple access / Computer crimes / Security token / Malware / Authentication / Multi-factor authentication / Phishing / AKA / Password / Cryptography / Security / EMC Corporation

‘2nd-Wave’ Advanced Threats: Preparing for Tomorrow’s Sophisticated Attacks SESSION ID: ANF-W01 Nikos Triandopoulos Principal Research Scientist

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-02-27 17:24:07
185Physics / Applied mathematics / Emerging technologies / Technology / Quantum key distribution / Id Quantique / Quantum mechanics / Optical fiber / Computer / Quantum cryptography / Cryptography / Quantum information science

QUANTUM KEY DISTRIBUTION CLAVIS2 THE MOST VERSATILE QUANTUM KEY DISTRIBUTION RESEARCH PLATFORM Quantum Key Distribution is a technology that exploits a fundamental principle of quantum physics - observation causes pertur

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
186Identity document / Passport / Public key certificate / Cryptography / Security / Identification

Application for Research Appointments

Add to Reading List

Source URL: crisp.nus.edu.sg

Language: English - Date: 2015-02-22 22:50:44
187Mathematics / Error detection and correction / Finite fields / Applied mathematics / Computing / McEliece cryptosystem / Forward error correction / RSA / Low-density parity-check code / Public-key cryptography / Coding theory / Electronic commerce

Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature Kazukuni Kobara Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), 10F 1003, Aki

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-20 21:26:35
188Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
189Cryptography / Knowledge / Association of Commonwealth Universities / Institute of Advanced Legal Studies / Legal research / Computer law / Digital signature / Electronic signature / SAS / Academic publishing / Academia / Publishing

Microsoft Word - Digital Evidence and Electronic Signature Law Review IALS SASOJS Proposal Nov 2013

Add to Reading List

Source URL: www.ials.sas.ac.uk

Language: English - Date: 2014-01-10 05:51:55
190Ciphertext indistinguishability / Deniable encryption / Semantic security / Public-key cryptography / Applied mathematics / Cipher / Probabilistic encryption / Cryptography / Cyberwarfare / Security

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 09:46:16
UPDATE