Cryptography

Results: 21893



#Item
521Cryptography / Cryptographic hash functions / Zero-knowledge proof / Function / Random oracle / Utility

Theory and Application of Extractable Functions A Dissertation Presented to the Faculty of the Graduate School of Yale University

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2009-07-02 20:00:57
522Cryptography / Email / Public key certificate

INSTRUCTOR RENEWAL 2015 The following information is being provided for those Instructors with a certificate that expires on December 31, 2015. • • • •

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2016-06-22 18:05:29
523Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
524Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
525Cryptography / Software engineering / E-commerce / RSA / Secure multi-party computation / ALGOL 68 / Const / Method / Public-key cryptography / Apache Avro

L1 - Faster Development and Benchmarking of Cryptographic Protocols Axel Schr¨opfer, Florian Kerschbaum, Debmalya Biswas, Steffen Geißinger, and Christoph Sch¨ utz SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2009-09-30 17:02:37
526Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:34
527Security / Prevention / Safety / Computer security / Data security / Crime prevention / Cryptography / National security / Information security / Health Insurance Portability and Accountability Act / Access control / Security controls

Microsoft Word - original policy template.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-11-14 16:36:30
528Cryptography / Format-preserving encryption / Feistel cipher / Ciphertext indistinguishability / Advantage

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-30 23:23:40
529Business / Small business / Biometrics / Computer law / Cryptography / Electronic signature / Signature / Security / New York State Small Business Development Center

PDF Document

Add to Reading List

Source URL: www.iowasbdc.org

Language: English - Date: 2016-07-27 14:51:17
530Cryptography standards / Computer security / Cryptography / Evaluation / FIPS 140-2 / Common Criteria / FIPS 140 / Common Criteria Testing Laboratory / Cryptographic Module Testing Laboratory

Microsoft Word - Choose_Testing_Lab.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
UPDATE