Cryptography Research

Results: 540



#Item
41Computing / Law / Privacy / Copyright law / Data security / Cryptography / Computer security / Identity management / P3P / Digital rights management / Internet privacy / Digital Millennium Copyright Act

Towards Realistic Assumptions, Models, and Goals for Security Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-05-22 10:45:07
42Cryptography / Block cipher / Probabilistic encryption / Semantic security / RSA / Advantage / Feistel cipher / Malleability / Chosen-plaintext attack / Ciphertext / Cryptosystem / Data Encryption Standard

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:54:04
43Security / Cyberwarfare / Computing / Software testing / Computer network security / Computer security / Cryptography / National security / Coverity / Vulnerability / Klocwork

Press Release Security Concerns Strengthen Automated Test Tool Demand, According to New Research by VDC Continuing to advance software security capabilities is critical as consumers and businesses conduct more high-value

Add to Reading List

Source URL: www.vdcresearch.com

Language: English - Date: 2016-02-01 13:56:29
44Digital media / Research / Shai Halevi / International Association for Cryptologic Research / Theory of Cryptography Conference / Electronic submission / Cryptography / Academic publishing

TCC 2016­B Call for Papers Submission Deadline   Friday, May 20, 2016, Anywhere on Earth Notification of Decision

Add to Reading List

Source URL: tcc2016b.sklois.cn

Language: English - Date: 2016-05-03 02:55:25
45Graph theory / Cryptography / Dining cryptographers problem / Vertex / Public-key cryptography / Graph / Connected component / Data Encryption Standard

J. Cryptology:Journal of CryptologyInternational Association for Cryptologic Research

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:04:47
46Darmstadt / Technische Universitt Darmstadt / Postdoctoral researcher / Technische Hochschule / Cryptography / Doctor of Philosophy / Habilitation / Center for Advanced Security Research Darmstadt

The Department of Computer Science of the Technische Universität Darmstadt invites applications for positions of Research Assistants in Cryptography and Complexity Theory both on doctoral and postdoctoral level, in the

Add to Reading List

Source URL: www.cryptoplexity.informatik.tu-darmstadt.de

Language: English - Date: 2016-08-19 22:14:13
47Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:38:35
48Cryptography / Computer access control / Security / Password / Biometrics / Speaker recognition / Computer security / Authentication / Challengeresponse authentication / Key / Password policy / Password manager

HCI and Security Systems Andrew Patrick National Research Council of Canada 1200 Montreal Rd. Ottawa, ON K1A 0R6

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:46
49Disk encryption / Trusted computing / Trusted Platform Module / Cryptography / Windows Vista / Trusted Computing Group / BitLocker / Cloud computing / Cloud storage / Trusted Execution Technology

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
50Computer network security / Cybercrime / National security / Computer security / Cryptography / Threat

INNOVATION AND TECHNOLOY FUND Post Project Evaluation Form for ITSP Projects Undertaken by Designated Local Public Research Institute Notes for Completion This evaluation form comprises two parts which should be complet

Add to Reading List

Source URL: www.itf.gov.hk

Language: English - Date: 2016-06-23 05:47:04
UPDATE