Cryptography Research

Results: 540



#Item
411Espionage / Cryptography / Malware / Data security / Backdoor / Port / Firewall / Distributed firewall / Cracking of wireless networks / Computer network security / Cyberwarfare / Computer security

A Trend Micro Research Paper Backdoor Use in Targeted Attacks Dove Chiu, Shih-Hao Weng, and Joseph Chiu Targeted Attack Defense Research Team

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-07-31 03:59:19
412Cryptography / Randomness / Methodology / Impact assessment / Impact evaluation / Program evaluation / Evaluation / Evaluation methods / Science

Types of Research Methods Evidence of effectiveness Method

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2012-11-07 16:28:50
413Cryptography / Randomness / Methodology / Impact assessment / Impact evaluation / Program evaluation / Evaluation / Evaluation methods / Science

Types of Research Methods Evidence of effectiveness Method

Add to Reading List

Source URL: www.doe.virginia.gov

Language: English - Date: 2012-11-07 16:28:41
414Checksum / Advantage / Block cipher / IAPM / RSA / Keystream / Cryptography / Stream ciphers / Block cipher modes of operation

Parallelizable Encryption Mode with Almost Free Message Integrity Charanjit S. Jutla IBM T. J. Watson Research Center, Yorktown Heights, NY[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:27:45
415Cryptographic protocols / Electronic commerce / Revocation list / Public key certificate / Certificate signing request / Management / CRL / Research and Innovative Technology Administration / Cryptography / Public-key cryptography / Key management

State of the ITS Industry

Add to Reading List

Source URL: www.its.dot.gov

Language: English - Date: 2011-12-09 12:17:21
416Combinatorial optimization / Cryptography / Dynamic programming / Knapsack problem / Operations research / TeX / Prime number / Euclidean algorithm / ALGOL 68 / Theoretical computer science / Mathematics / Applied mathematics

310 TUGboat, Volume[removed]), No. 3 Macros Fast and secure multiple-option tests

Add to Reading List

Source URL: www.tug.org

Language: English - Date: 1998-03-13 09:09:58
417Cryptography / Knowledge / Association of Commonwealth Universities / Institute of Advanced Legal Studies / Legal research / Computer law / Digital signature / Electronic signature / SAS / Academic publishing / Academia / Publishing

Microsoft Word - Digital Evidence and Electronic Signature Law Review IALS SASOJS Proposal Nov 2013

Add to Reading List

Source URL: ials.sas.ac.uk

Language: English - Date: 2014-01-10 05:51:55
418Authentication / Notary / Packaging / Multi-factor authentication / Strong authentication / Password / Two-factor authentication / Security token / Security / Cryptography / Access control

Multi-factor Mobile Authentication Ram Ramachandran Program Director, Adv. Technologies IBM Research [removed]

Add to Reading List

Source URL: g3ict.org

Language: English - Date: 2014-06-19 17:40:35
419Crime prevention / National security / Cyberwarfare / Computer security / Public safety / Internet security / Encryption / Information security / Network security / Security / Computer network security / Cryptography

Cyber Security Companies, governments, and consumers depend on secure and reliable computer networks and data products. But as technology becomes more complex, security threats also become more complicated. Wireless netw

Add to Reading List

Source URL: www.research.umd.edu

Language: English - Date: 2012-12-14 16:59:35
420Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
UPDATE