Cryptography Research

Results: 540



#Item
401Evaluation methods / Methodology / Data collection / Cryptography / Market research / Coding / Survey methodology / Questionnaire / Code / Statistics / Science / Research methods

Appendix C APPENDIX C: GENERAL CODING INSTRUCTIONS The coding specifications are the work rules for coding the information collected by the interviewers. Although many questions are coded independently, others link up w

Add to Reading List

Source URL: publicdata.norc.org

Language: English - Date: 2013-04-02 11:17:54
402Cryptography / Computer crimes / Password / Phishing / Salt / Two-factor authentication / Self-service password reset / Single sign-on / Password policy / Security / Computer security / Access control

AUTHENTICATION TECHNOLOGIES A Research Agenda Acknowledging the Persistence of Passwords Cormac Herley | Microsoft Research Paul van Oorschot | Carleton University

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2012-02-29 13:44:49
403Diffie–Hellman key exchange / Public-key cryptography / Internet Key Exchange / Shared secret / Public key infrastructure / Elliptic curve Diffie–Hellman / MQV / Cryptography / Cryptographic protocols / Key-agreement protocol

Deniable Authenticated Key Establishment for Internet Protocols Colin Boyd1? and Wenbo Mao2?? and Kenneth G. Paterson3? ? ? 1 Information Security Research Centre, Queensland University of Technology,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-04-22 14:15:54
404Medicine / Privacy / Law / Medical device / Internet privacy / Information privacy / Computer security / Cryptography / Encryption / Technology / Ethics / Computer network security

Privacy Challenges for Wireless Medical Devices Brent Lagesse Cyberspace Sciences and Information Intelligence Research Computational Sciences and Engineering Oak Ridge National Laboratory Oak Ridge, TN 37831

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2010-08-23 10:26:41
405Computer crimes / Cryptography / Identity management / Password / Phishing / One-time password / Single sign-on / Challenge-response authentication / Keystroke logging / Security / Computer security / Access control

Proc. WWW 2007, Banff, BC A Large-Scale Study of Web Password Habits Dinei Florencio

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 13:41:07
406Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
407Payment systems / Electronic commerce / Personal identification number / Cryptographic nonce / Mobile banking / One-time password / Transaction authentication number / Authentication / Automated teller machine / Technology / Security / Cryptography

Usably Secure, Low-Cost Authentication for Mobile Banking Saurabh Panjwani, Edward Cutrell Microsoft Research India {saurap,cutrell}@microsoft.com ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-06-22 10:03:22
408Health Insurance Portability and Accountability Act / Digital signature / Confidentiality / Cryptography / Privacy law / Data privacy

DUA#__________________________ NC DHHS MH/DD/SA Integrated Research Database Data Use Agreement for Limited Data Set This Data Use Agreement (“DUA”) is effective on the ____ day of ________, 20__, (“Effective Date

Add to Reading List

Source URL: www.communitycarenc.com

Language: English - Date: 2012-12-07 16:13:51
409Key management / Notary / Public-key cryptography / Cyberwarfare / Cryptography / Civil law / Digital signature

Office of Research Services (ORS) Agreement Approval Request Form Updated June 3, 2014 STEP 1: STEP 2:

Add to Reading List

Source URL: files.upei.ca

Language: English - Date: 2014-07-22 14:51:36
410Project 25 / Telecommunications engineering / Wireless / Cryptography / Interoperability / Vocoder / Digital radio / Technology / Electronics / Trunked radio systems

Public Safety Communications Research (PSCR) Program

Add to Reading List

Source URL: www.pscr.gov

Language: English - Date: 2012-04-02 15:15:22
UPDATE