Cryptography Research

Results: 540



#Item
451Cryptography / Identity management / Password strength / Password / Passphrase / One-time password / Phishing / Password cracking / Random password generator / Security / Computer security / Access control

Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts∗ Dinei Florˆencio and Cormac Herley Microsoft Research, Redmond, USA Paul C. van Oorschot

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-07-14 18:33:20
452Information / FIPS 140-2 / IBM / Device driver / FIPS 140 / Smart card / Operating system / Communications protocol / Secure cryptoprocessor / Cryptography standards / Computing / Espionage

IBM 4758 Model 23 Security Policy Secure Systems and Smart Cards Group IBM T.J. Watson Research Center June 15, [removed]Scope of Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
453Computing / BlackBerry / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / Cryptographic Module Validation Program / BlackBerry OS / Research In Motion / Linux kernel / Cryptography standards / Software / Cryptography

Microsoft Word - BlackBerry_Enterprise_Server_Cryptographic_Kernel_v1.0.2.5…

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
454Medicine / Privacy / Law / Medical device / Internet privacy / Information privacy / Computer security / Cryptography / Encryption / Technology / Ethics / Computer network security

Privacy Challenges for Wireless Medical Devices Brent Lagesse Cyberspace Sciences and Information Intelligence Research Computational Sciences and Engineering Oak Ridge National Laboratory Oak Ridge, TN 37831

Add to Reading List

Source URL: www.csiir.ornl.gov

Language: English - Date: 2010-08-23 10:26:41
455Internet / Computing / Technology / Cryptography / Electronic signature / Email

PIADC Research Participation Program Application

Add to Reading List

Source URL: www.orau.gov

Language: English - Date: 2013-05-07 16:23:14
456Espionage / FIPS 140-2 / IBM / Device driver / FIPS 140 / Smart card / Operating system / Communications protocol / Computer security / Cryptography standards / Computing / Security

IBM 4758 Model 2 Security Policy Secure Systems and Smart Cards Group IBM T.J. Watson Research Center June 15, [removed]Scope of Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
457Cryptographic software / Smart card / Key management / Challenge-response authentication / Public-key cryptography / Critical Security Parameter / Hardware security module / Microsoft CryptoAPI / Cryptography / Cryptography standards / FIPS 140

Algorithmic Research PrivateServer FIPS[removed]Non-Proprietary Security Policy Level 3 Validation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
458Semantic security / XTR / ID-based encryption / Security / Applied mathematics / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Cyberwarfare

Witness Encryption from Instance Independent Assumptions Craig Gentry IBM Research, T.J. Watson [removed] Allison Bishop Lewko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-30 01:07:28
459Higher education in Canada / Fax / Office equipment / Canadian Water Network / Civil law / Email / Digital signature / Natural Sciences and Engineering Research Council / University of Waterloo / Electronic documents / Technology / Cryptography

Completed proposals must be submitted no later than 11:59 p.m. (EST) on February 17, 2014. Acceptable delivery is by fax, courier, or scanned and emailed to: Print one copy of this form for each funded investigator, obta

Add to Reading List

Source URL: www.cwn-rce.ca

Language: English - Date: 2013-12-17 09:36:04
460Higher education in Canada / Fax / Civil law / Digital signature / Natural Sciences and Engineering Research Council / Technology / Canadian Water Network / Cryptography

Completed forms must be submitted no later than 11:59 p.m. (EST) on February 17, [removed]Acceptable delivery is by fax, courier, or scanned and emailed to: Print one copy of this form for each investigator (except the pri

Add to Reading List

Source URL: www.cwn-rce.ca

Language: English - Date: 2013-12-17 09:36:01
UPDATE