Cryptography Research

Results: 540



#Item
51Cloud computing / Cloud storage / Cloud infrastructure / Cloud computing security / Computer security / Cloud applications / Public-key cryptography / Encryption / Crypto cloud computing / Perspecsys

nternational Journal & Magazine of Engineering, Technology, Management and Research Volume 1, Issue 10, October

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:18
52Homeomorphisms / Homomorphic encryption / Public-key cryptography / Learning with errors / Spectral theory

FHE Circuit Privacy Almost For Free Florian Bourse∗ , Rafa¨el Del Pino† , Michele Minelli‡ , and Hoeteck Wee§ ENS, CNRS, INRIA, and PSL Research University, Paris, France {fbourse,delpino,minelli,wee}@di.ens.fr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-13 09:13:32
53Computer network security / Cybercrime / National security / Computer security / Cryptography / Threat

INNOVATION AND TECHNOLOY FUND Post Project Evaluation Form for ITSP Projects Undertaken by Designated Local Public Research Institute Notes for Completion This evaluation form comprises two parts which should be complet

Add to Reading List

Source URL: www.itf.gov.hk

Language: English - Date: 2016-06-23 05:47:04
54Domain name system / Internet protocols / Internet Standards / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / OpenDNSSEC / TKEY record / Extension mechanisms for DNS / ODS / BIND / Root name server

System & Network Engineering Resilient OpenDNSSEC research project 2 Student

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-09-18 05:04:11
55Cryptography / Computer network security / Computer security / Cyberwarfare / National security / Secure communication / Application security / Communications security / Wireless security / Software-defined radio / Advanced Learning and Research Institute / Software security assurance

NRL BAA Announcement # HIGH ASSURANCE ENGINEERING AND COMPUTING The Center for High Assurance Computer Systems of the Naval Research Laboratory (NRL) is seeking white papers for innovative research, advanced sys

Add to Reading List

Source URL: heron.nrl.navy.mil

Language: English - Date: 2016-02-17 10:17:54
56Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
57Computer security / National security / Security / Crime prevention / Cryptography / Tata Consultancy Services / Information security / Resilience / Chief information security officer / Threat / MasterCraft / Tata Research Development and Design Centre

TCS Enterprise Security and Risk Management Solutions and Services Enterprise Security and Risk Management The digital era has created unprecedented opportunities for organizations to conduct

Add to Reading List

Source URL: www.tcs.com

Language: English - Date: 2015-01-21 03:50:21
58Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
59Public-key cryptography / Key management / Cryptography / Public key infrastructure / Transport Layer Security / Usability / Computer security / Email / Mobile security

Toward Usable Security Dirk Balfanz, Palo Alto Research Center Traditionally, security and usability have been considered to be a design trade-off, where the user ends up with one or the other, but not both. We believe t

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-05-05 09:39:31
60Joachim von zur Gathen / Cryptography / Research

Microsoft Word - Modulhandbuch-MI-seminar-2012.doc

Add to Reading List

Source URL: cosec.bit.uni-bonn.de

Language: English - Date: 2014-02-03 06:03:57
UPDATE