Cryptography

Results: 21893



#Item
411Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2014-08-03 16:15:38
412Cryptography / Food and drink / Government of Pakistan / Tea culture / Tea / Tea ceremony / Inter-Services Intelligence / Lunch / Cryptanalysis / Gupta / Tiny Encryption Algorithm

DayAfternoon I 14:30 – 16:00

Add to Reading List

Source URL: www.isical.ac.in

Language: English
413Software / Computer access control / Computer security / Password / Security / Pass / Cryptography / Identity management systems / Password manager / Password fatigue

Microsoft Word - Bostwana_user_forgot_password

Add to Reading List

Source URL: intl.bobibanking.com

Language: English - Date: 2010-05-20 00:35:00
414Security / Computing / National security / Crime prevention / Cryptography / Information governance / Cybercrime / Email / M.I / Signature block / Computer security

Microsoft Word - PSD040_Security Designee.doc

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2016-08-23 19:48:19
415Cryptocurrencies / Cryptography / Computing / E-commerce / Blockchain / Ethereum / Secure multi-party computation / Secret sharing / Smart contract / Bitcoin / Distributed hash table / Shadow

Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind Oz Nathan

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2015-06-27 14:46:30
416Security / Data management / Computing / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Data / Computer emergency response team / Search engine indexing

Data Mining in Incident Response Challenges and Opportunities Alexandre Dulaunoy TLP:WHITE Information Security Education

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-08-11 10:49:35
417Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
418Security / Espionage / Prevention / National security / Intelligence analysis / Military intelligence / Crime prevention / Cryptography / Counterintelligence / Computer security / International Traffic in Arms Regulations / Central Intelligence Agency

DOC Document

Add to Reading List

Source URL: www.wrc.noaa.gov

Language: English - Date: 2006-12-26 13:04:28
419Cryptography / Notary / Legal documents / Key management / Public key infrastructure / Public-key cryptography / Public key certificate / Act / Email / Academia Sinica / Thesis

Employee Separation Checklist

Add to Reading List

Source URL: tigp.sinica.edu.tw

Language: English - Date: 2016-06-01 08:39:46
420Digital media / Copyright law / Cryptography law / Digital rights management / Media technology / Humble Bundle / E-book / ITunes Store

Microsoft Word - EFF et al. Letter to FTC re DRM Labelling for Electronic Retailers.docx

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2016-08-05 19:06:51
UPDATE