Cryptography

Results: 21893



#Item
511Computer security / Security / Computing / Data security / Information Security Forum / Crime prevention / Cryptography / National security / Standard of Good Practice / Information security / Payment Card Industry Data Security Standard / COBIT

2014 ISF 25th Anniversary Logo Blue with Red Text

Add to Reading List

Source URL: www.securityforum.org

Language: English - Date: 2015-11-27 07:52:37
512Cryptography / Insurance / Brighton / Public key certificate

TOWN OF BRIGHTON P.O. Box 260, Paul Smiths, New York • (APPLICATION FOR USE OF THE TOWN HALL Today’s Date _________

Add to Reading List

Source URL: www.townofbrighton.net

Language: English - Date: 2006-09-21 17:14:29
513Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
514Codebook / Cryptography / Social research

PDF Document

Add to Reading List

Source URL: pages.wustl.edu

Language: English - Date: 2014-03-07 11:33:11
515Cryptography / Aviation safety / Federal Aviation Administration / Public key certificate / Federal Communications Commission / Radiation Control for Health and Safety Act

The South Carolina General Assembly is offering access to the unannotated South Carolina Code of Laws on the Internet as a ser

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2016-05-06 09:01:33
516Cryptography / Forest certification / Forestry / Forest Stewardship Council / Timber industry / Economy / Public key certificate / ScS

SCScertificate_landscape_050912

Add to Reading List

Source URL: www.arclin.com

Language: English - Date: 2014-12-17 09:21:01
517Computing / Network architecture / Cryptographic protocols / Computer network security / Cryptography / Tunneling protocols / Virtual private networks / Internet protocols / IPsec / Internet Key Exchange / Layer 2 Tunneling Protocol / NAT traversal

Secure Business Connectivity HOBLink VPN 2.1 Gateway The VPN Solution for More Security and Greater Flexibility Edition 10|13

Add to Reading List

Source URL: www.hobsoft.com

Language: English - Date: 2014-01-10 07:06:54
518Cryptography / Computing / Mass surveillance / Cryptographic protocols / Internet protocols / Applied mathematics / RSA Security / Dual EC DRBG / Bullrun / National Security Agency / IPsec / RSA BSAFE

Microsoft PowerPoint - preneel_iacr_dl_vienna2016_print.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2016-05-11 07:33:19
519Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Atos / Computer security / Internet privacy / Internet

EEMA online September 2015 Issue 15 Dates for your diary 7 October Re-inventing your Business through Digital

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
520Graz University of Technology / Institute for Applied Information Processing and Communications / Cryptography / Education

(Non-)Membership Proofs Advisor(s): David Derler, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
UPDATE