Cryptography

Results: 21893



#Item
621Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
622Cryptography / Public-key cryptography / Key management / Public key infrastructure / Computer access control / E-commerce / One-time password / Certificate authority / Internet Explorer / Public key certificate / Password / Security and safety features new to Windows Vista

FAQs: Digital Certificate Service    

Add to Reading List

Source URL: myexostar.com

Language: English - Date: 2016-06-17 15:09:11
623Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-19 14:59:40
624Identity management / Computer access control / FIPS 201 / Standards / Presidential directive / Cryptography / Authentication / Credential / Interoperability / Computer security / Engineering

Identity Management Focuses on Credentialing HSPD-12 Will Serve as a Unifier for Agencies Security Inc. of Redwood City, Calif., 59 percent of system integrators (SIs) surveyed see the lack of

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
625Computing / Cloud computing / Software / Cryptography / Copy protection / FlexNet Publisher / System administration / Internet of things / Flexera Software / Installation / Computer security / Software as a service

Flexible licensing, activation, delivery and full lifecycle management Amy Konary – Research Vice President - Software Licensing &

Add to Reading List

Source URL: media.flexerasoftware.com

Language: English - Date: 2015-03-19 18:40:46
626Cryptography / Public-key cryptography / Computational complexity theory / Proof of knowledge / Zero-knowledge proof / IP / Raspberry Pi

LNCSA Universally Composable Mix-Net

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:39:36
627Computing / Cryptography / Network architecture / Internet protocols / Cryptographic protocols / Secure communication / Hypertext Transfer Protocol / World Wide Web / Transport Layer Security / Secure Remote Password protocol / Communications protocol / HTTPS

PLACES’10 The 3rd Workshop on Programming Language Approaches to Concurrency and Communication-Centric Software

Add to Reading List

Source URL: places10.di.fc.ul.pt

Language: English - Date: 2010-12-07 19:00:11
628Computational complexity theory / Cryptography / Theory of computation / Probabilistic complexity theory / IP / Zero-knowledge proof / Soundness / PP / Entropy / NP / Randomized algorithm / Interactive proof system

An Efficient Parallel Repetition Theorem Johan H˚ astad1 , Rafael Pass2, Douglas Wikstr¨ om3 , and Krzysztof Pietrzak4 1 KTH, Stockholm, supported by ERC grant

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:53:38
629Cryptography / Registrar / Public key certificate

Microsoft Word - gradcertapp.doc

Add to Reading List

Source URL: grad.mst.edu

Language: English - Date: 2015-02-18 18:07:24
630Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

SMART, SECURE NETWORKS OF CONNECTED PEOPLE SECURE INFORMATION SHARING Secure, scalable collaboration solutions developed especially for organisations with the most demanding security requirements.

Add to Reading List

Source URL: www.surevine.com

Language: English - Date: 2016-02-16 06:08:14
UPDATE