Cryptography Research

Results: 540



#Item
251Software / Internet protocols / Lightweight Directory Access Protocol / Abstract Syntax Notation One / Public-key cryptography / OpenLDAP / X.509 / Attribute grammar / Parsing / Computing / Directory services / Compiler construction

IBM Research / Linux Technology Center Implementing GSER and Component Matching Sang Seok Lim IBM Research

Add to Reading List

Source URL: www.openldap.org

Language: English - Date: 2014-09-29 17:45:14
252Failure / Mix network / Cypherpunk / Cascades / MIX / Cascade Range / Reliability engineering / Systems engineering / Systems science / Internet privacy / Anonymous remailer / Cryptography

Reliable MIX Cascade Networks through Reputation Roger Dingledine, Reputation Technologies Paul Syverson, Naval Research Lab 1

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2007-02-09 23:47:33
253Crime prevention / National security / Human rights / Malware / Cryptography / Computer security / DARPA / Privacy / Science / Ethics / Security / Computer network security

•  Name
of
Organiza.on:
Palo
Alto
Research
Center
(PARC)
 •  Lead
Inves.gator:
Diana
SmeAers
 •  Current
Team
Members:

 –  –  – 

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
254Computer network security / Computer security / Cryptography standards / Secure communication / CRYPTREC / Cryptography / Information security / Network security / National Security Agency / Security / Crime prevention / National security

Network Security Research Institute Organization of the Network Security Research Institute, NICT NICT

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-08-13 01:28:32
255Computing / Payment systems / Cryptography / Financial cryptography / Money / Proof-of-work system / Electronic money / Peer-to-peer / Ven / Software / Bitcoin / Peer-to-peer computing

Removing Impediments to Bitcoin’s Success: A Risk Management Study Bitcoin Foundation Research Brief No. 1 Spring 2014

Add to Reading List

Source URL: bitcoinfoundation.org

Language: English - Date: 2014-07-29 11:34:51
256International trade / Business / Technology / International Traffic in Arms Regulations / United States Munitions List / Export / Office of Foreign Assets Control / Export Control Classification Number / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

Export Control Fact Sheet

Add to Reading List

Source URL: research.case.edu

Language: English - Date: 2012-11-07 15:35:02
257Internet standards / Cryptography standards / Secure communication / PKCS / Network Security Services / Padding / MD5 / RSA / Sizeof / Cryptography / Public-key cryptography / Electronic commerce

Intel Security: Advanced Threat Research BERserk Vulnerability Part 2: Certificate Forgery in Mozilla NSS October 6, 2014

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2014-10-06 18:24:36
258Computer security / FIPS 140-2 / FIPS 140 / Side channel attack / Tamper resistance / Power analysis / Field-programmable gate array / CRYPTREC / FIPS 140-3 / Cryptography standards / Cryptography / Espionage

Report for Tamper-Resistance Standardization Research Committee

Add to Reading List

Source URL: www.jsa.or.jp

Language: English - Date: 2006-10-09 22:25:29
259Cryptography / Encryption / Backup / Internet privacy / Privacy / Information privacy / Ethics / Data security / Identity management

UBC Okanagan UBC Okanagan BREB Behavioural Research Ethics Board Research Data Storage and Security

Add to Reading List

Source URL: ors.ok.ubc.ca

Language: English - Date: 2015-03-17 18:17:30
260Computational complexity theory / Combinatorial optimization / NP-complete problems / Cryptography / Dynamic programming / Knapsack problem / Branch and bound / Optimization problem / Backtracking / Operations research / Theoretical computer science / Applied mathematics

Yet Harder Knapsack ProblemsI Stasys Jukna∗,1 Georg Schnitger University of Frankfurt, Institut of Computer Science, DFrankfurt, Germany. Abstract

Add to Reading List

Source URL: lovelace.thi.informatik.uni-frankfurt.de

Language: English - Date: 2011-10-21 09:58:40
UPDATE