Cryptography Research

Results: 540



#Item
421Public-key cryptography / One-way function / Trapdoor function / Password-authenticated key agreement / Random oracle / PP / NP / Oracle machine / RSA / Cryptography / Cryptographic protocols / Cryptographic hash functions

J. Cryptology[removed]OF1–OF35 DOI: [removed]s00145[removed] © 2006 International Association for Cryptologic Research Trapdoor Hard-to-Invert Group

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
422Combinatorial optimization / Cryptography / Dynamic programming / Knapsack problem / Operations research / TeX / Prime number / Euclidean algorithm / ALGOL 68 / Theoretical computer science / Mathematics / Applied mathematics

310 TUGboat, Volume[removed]), No. 3 Macros Fast and secure multiple-option tests

Add to Reading List

Source URL: tug.org

Language: English - Date: 1998-03-13 09:09:58
423Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Cloud computing / Node / Eucalyptus / Public-key cryptography / Computer security / Trusted computing / Computing

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues†, Krishna P. Gummadi, Stefan Saroiu‡ MPI-SWS, † CITI/Universidade Nova de Lisboa, ‡ Microsoft Research Abst

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-07-17 05:59:19
424Internet protocols / Cryptographic protocols / Directory services / X.509 / Public key certificate / Handle System / Public key infrastructure / PERMIS / Certificate authority / Cryptography / Public-key cryptography / Key management

Establishing Persistent Identity using the Handle System Sam X. Sun Corporation for National Research Initiatives 1895 Preston White Dr. Suite 100 Reston, VA[removed]ssu

Add to Reading List

Source URL: www10.org

Language: English - Date: 2001-04-19 03:09:44
425Combinatorial optimization / Cryptography / Dynamic programming / Knapsack problem / Operations research / TeX / Prime number / Euclidean algorithm / ALGOL 68 / Theoretical computer science / Mathematics / Applied mathematics

310 TUGboat, Volume[removed]), No. 3 Macros Fast and secure multiple-option tests

Add to Reading List

Source URL: tug.org

Language: English - Date: 1998-03-13 09:09:58
426Applied mathematics / Keystroke dynamics / Password / Private biometrics / Key / Entropy / Pseudorandomness / Brute-force attack / Quantization / Biometrics / Cryptography / Security

Towards Practical Biometric Key Generation with Randomized Biometric Templates ∗ Lucas Ballard Google, Inc.

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-03-17 13:11:09
427Notary / Blind signature / Electronic voting / Digital signature / Trusted third party / RSA / Diffie–Hellman key exchange / Non-repudiation / Alice and Bob / Cryptography / Public-key cryptography / Cryptographic protocols

An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature Guilin Wang Infocomm Security Department Institute for Infocomm Research (I2 R) 21 Heng Mui Keng Terrace, Singapore[removed]

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 05:24:15
428Public-key cryptography / Fletcher Allen Health Care / Vermont / Electronic commerce / Key management / Public key certificate

STATE OF VERMONT GREEN MOUNTAIN CARE BOARD In re: Application of Fletcher Allen Health Care Replacement of Mother Baby Unit and General Clinical Research Center

Add to Reading List

Source URL: gmcboard.vermont.gov

Language: English - Date: 2013-10-16 09:12:07
429Canadian Institutes of Health Research / Health Canada / Digital signature / Signature / Cryptography / Security / Notary

4 EN - FORM - Request to Change Location of Tenure for Training Award

Add to Reading List

Source URL: www.cihr-irsc.gc.ca

Language: English - Date: 2014-02-22 14:58:44
430Internet ethics / Human rights / Internet privacy / Cryptography / Secrecy / Security through obscurity / Privacy / Online identity / Anonymity / Ethics / World Wide Web / Computing

THE CASE FOR ONLINE OBSCURITY Woodrow Hartzog* and Frederic Stutzman** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demo

Add to Reading List

Source URL: www.futureofprivacy.org

Language: English - Date: 2011-09-30 13:02:58
UPDATE