Cryptography Research

Results: 540



#Item
341International trade / Business / International relations / International Traffic in Arms Regulations / United States law / Export / United States Munitions List / Office of Foreign Assets Control / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

EXPORT CONTROLS: OVERVIEW & CHECKLIST FOR RESEARCHERS What are Export Controls? “Export Controls” are federal statutes and regulations restricting the transfer of goods and technology to foreign persons and entities

Add to Reading List

Source URL: research.unt.edu

Language: English - Date: 2013-09-18 15:32:21
342Identity document / Passport / Public key certificate / Cryptography / Security / Identification

Microsoft Word - form-research.doc

Add to Reading List

Source URL: www.crisp.nus.edu.sg

Language: English - Date: 2010-10-12 02:15:10
343Identity document / Passport / Public key certificate / Cryptography / Security / Identification

Application for Research Appointments

Add to Reading List

Source URL: www.crisp.nus.edu.sg

Language: English - Date: 2010-10-12 02:15:10
344RSA / Kaliski / Cryptography / Burt Kaliski / Verisign

DR. BURT KALISKI JR. SENIOR VICE PRESIDENT AND CHIEF TECHNOLOGY OFFICER Dr. Burt Kaliski Jr., senior vice president and developing the company’s long-term technology which focuses on applied research, university

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-07-11 11:30:07
345Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Privacy / Medical informatics / Confidentiality / Protected health information / Medical record / Medical privacy / Ethics / Health / Cryptography

HIPAA Privacy Training for Temporary Non-Research Staff HIPAA Overview What is HIPAA? HIPAA stands for the Health Insurance Portability and Accountability Act, a federal law which was passed in[removed]HIPAA imposes severa

Add to Reading List

Source URL: hipaa.yale.edu

Language: English - Date: 2013-11-19 21:08:03
346Password / Salt / Crypt / Rainbow table / Key stretching / Key derivation function / Ophcrack / Password policy / Security Accounts Manager / Cryptography / Computer security / Security

An Administrator’s Guide to Internet Password Research∗ Dinei Florˆencio and Cormac Herley Microsoft Research, Redmond, USA Paul C. van Oorschot Carleton University, Ottawa, Canada

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-08-31 16:13:05
347Computer network security / Cryptographic protocols / Electronic commerce / Secure communication / National security / Transport Layer Security / Center for Advanced Security Research Darmstadt / Cloud computing / Privacy / Security / Computing / Cryptography

ESORICS 2012 Week - Complete Program (ESORICS – DPM – EUROPKI – QASA – SETOP – STM) (version 05 Sept[removed]ESORICS 2012 Program

Add to Reading List

Source URL: www.iit.cnr.it

Language: English - Date: 2012-09-06 09:21:13
348International trade / Business / International relations / International Traffic in Arms Regulations / Weapons / Export / United States Munitions List / Office of Foreign Assets Control / Export of cryptography in the United States / Identifiers / Military technology / United States Department of Commerce

EXPORT CONTROLS AND RESEARCH AT WPI TRAINING PRESENTATION EXPORT CONTROL LAWS

Add to Reading List

Source URL: www.wpi.edu

Language: English - Date: 2009-12-09 15:20:35
349United States Department of Commerce / Technology / Law / International Traffic in Arms Regulations / United States law / Business / Export / Proprietary software / Cryptography / Computer law / Identifiers / Military technology

Print Form TRAVELING WITH A LAPTOP COMPUTER OR ELECTRONIC DEVICES Faculty, staff, and students often travel with a laptop computer, PDA, flash drive or other electronic devices. It is important to note, that these elect

Add to Reading List

Source URL: research.unl.edu

Language: English - Date: 2012-01-18 12:37:56
350Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
UPDATE