Cryptography Research

Results: 540



#Item
241Computer architecture / Cloud clients / Electronic commerce / Android / Embedded Linux / Public-key cryptography / Transport Layer Security / BlackBerry / IOS / Computing / Software / Smartphones

Threema security assessment Research project for Security of Systems and Networks Master System and Network Engineering Hristo Dimitrov, Jan Laan, Guido Pineda December 22, 2013

Add to Reading List

Source URL: www.os3.nl

Language: English - Date: 2014-02-21 06:55:34
242Key distribution / Key management / Public-key cryptography / ANT / Computer network / Telecommunications engineering / Electronic engineering / Key distribution in wireless sensor networks / Network coding / Wireless sensor network / Wireless networking / Technology

Microsoft Word - Hu_abstract_14May11.doc

Add to Reading List

Source URL: research.unsw.adfa.edu.au

Language: English - Date: 2011-05-23 02:21:58
243Elliptic curve cryptography / Algorithmic Number Theory Symposium / Dan Boneh / International Association for Cryptologic Research / Pairing / Lecture Notes in Computer Science / International Cryptology Conference / Elliptic curve / PKC / Cryptography / Abstract algebra / Finite fields

David Mandell Freeman (+[removed]Curriculum Vitae [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2012-06-11 19:59:59
244Data Encryption Standard / International Cryptology Conference / Full Domain Hash / Index of cryptography articles / Cryptography / International Association for Cryptologic Research / Eurocrypt

V GUIDE Table of Contents Preface Program Committee

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-01-16 14:16:27
245Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Electronic money / Silk Road / Cloud computing / IBM / Computing / Software / Electronic commerce

IBM Research – Zurich Crypto-currencies & their Security Provisions Dr. Elli Androulaki

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-28 08:39:43
246Photonics / Optical fiber / Quantum network / Quantum cryptography / Emerging technologies / ICFO / Quantum key distribution / Quantum information science / Physics / Optics

1 Research Activities on Photonic and Quantum Communications in NICT SASAKI Masahide and KAWANISHI Tetsuya Communications technology has changed greatly since the invention of lasers and optical fibers. Today, informatio

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 19:54:06
247Coding / Research / Codebook / Atlas.ti / Code / Lorrie Cranor / Internet privacy / Cryptography / Statistics / Science

08- UPS @ Home and Analyzing Qualitative Data Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:18
248Secure multi-party computation / Secure two-party computation / Cryptography / Homomorphic encryption / Intelligence Advanced Research Projects Activity / Cryptographic primitive / Communications protocol / Cryptographic protocols / Data / Information

Microsoft Word - RFI SPAR-MPC[removed]docx

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
249Cryptography / Failure / Fault tolerance / Theory of computation / Byzantine fault tolerance / Fault-tolerant system / Communications protocol / Software bug / Fault-tolerant design / Computing / Fault-tolerant computer systems / Systems engineering

The Saddest Moment James Mickens James Mickens is a researcher in the Distributed Systems group at Microsoft’s Redmond

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-10-02 17:06:29
250Internet privacy / Webmail / Internet / Web 2.0 / Email authentication / S/MIME / Gmail / Email encryption / Public-key cryptography / Computing / Cryptography / Email

Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes Scott Ruoti, Nathan Kim, Ben Burgon, Timothy van der Horst, Kent Seamons Internet Security Research Lab Computer Science Department Brigham Young

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
UPDATE