Cryptography Research

Results: 540



#Item
21Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-22 08:29:01
22Cryptography / Public-key cryptography / Attribute-based encryption / Encryption / ID-based encryption / Personal health record / RSA / Key / Cipher / Data Encryption Standard / Cloud computing security / Identity-based conditional proxy re-encryption

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:15:02
23Computing / Cloud computing / Software / Cryptography / Copy protection / FlexNet Publisher / System administration / Internet of things / Flexera Software / Installation / Computer security / Software as a service

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
24Cryptography / Block ciphers / Data Encryption Standard / Substitution-permutation network / Linear cryptanalysis / Serpent / Q / Advanced Encryption Standard / ARIA / PRESENT / S-box / Stream cipher

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-27 11:40:43
25Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
26Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
27Binary arithmetic / Finite fields / Computing / Mathematics / Data transmission / Error detection and correction / Cryptography / Cyclic redundancy checks / Linear-feedback shift register / Parity bit / Cksum / Polynomial code

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-15 08:13:39
28Cryptography / Advanced Encryption Standard / Block ciphers / Data Encryption Standard / Finite fields / Block size / Rijndael S-box / AES implementations / Blowfish

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:08:26
29Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / Internet privacy / Computer security / Usability

Two Experiences Designing for Effective Security Rogério de Paula, Xianghua Ding, Paul Dourish, Kari Nies, Ben Pillet, David Redmiles, Jie Ren, Jennifer Rode and Roberto Silva Filho Institute for Software Research Unive

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
30Cryptography / Security / Idiap Research Institute / Martigny / Surveillance / Civil law common law) / Biometrics / BioWatch / CSEM / Authentication / Neuchtel

Microsoft Word - CP16-Biowave_EN_pdfversion

Add to Reading List

Source URL: www.biowatch.ch

Language: English - Date: 2016-02-05 11:08:35
UPDATE