Cryptography

Results: 21893



#Item
731Cryptography / Quantum cryptography / Quantum information science / Quantum key distribution

Microsoft PowerPoint - qcryptCompatibility Mode]

Add to Reading List

Source URL: www.qcrypt2011.ethz.ch

Language: English - Date: 2011-09-26 13:39:03
732Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Acceptable use policy / Authorization / Freedom of information laws by country / Privacy

RUTGERS POLICY Section: Section Title: Information Technology Policy Name: Acceptable Use Policy for Information Technology Resources Formerly Book: N/A Approval Authority: Senior Vice President for Administration

Add to Reading List

Source URL: policies.rutgers.edu

Language: English - Date: 2016-08-22 21:33:41
733Cryptography / Business / E-commerce / Procurement / Supply chain management / Systems engineering / Government procurement / Public key certificate / Business license

PDF Document

Add to Reading List

Source URL: www.museums.or.ke

Language: English - Date: 2016-05-13 01:45:53
734Computational complexity theory / Theory of computation / Cryptography / Complexity classes / Quantum complexity theory / IP / Proof of knowledge / NP / PP / XTR / PSPACE / Communications protocol

LNCSParallel Repetition of Computationally Sound Protocols Revisited

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:12
735Cryptography / Electronic health records / Health / Healthcare in Australia / Medical technology / Nursing informatics / Public key certificate / Hospital information system / Personally Controlled Electronic Health Record

My Health Record - Healthcare Provider Registration Summary

Add to Reading List

Source URL: myhealthrecord.gov.au

Language: English - Date: 2016-04-29 03:38:11
736Cryptography / Advanced Encryption Standard / X86 instructions / Rambus / Side-channel attack / AES instruction set / Cryptography Research / Masking / Technology / Computing

Microarchitectures Undo Software Security Measures • To implement secure algorithms, software based cryptography utilizes the ISA through instructions or cryptographic extensions.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2015-08-21 02:18:30
737Quantum information science / Quantum mechanics / Physics / Theoretical computer science / Quantum cryptography / Quantum computing / Cryptography / Quantum key distribution / Quantum entanglement / Quantum teleportation / Qubit / Photon

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-07-27 17:15:17
738Cryptography / Internet privacy / Anonymous remailer / Public-key cryptography / Social networking service / Peer-to-peer / Technology

Secure Encounter-based Social Networks: Requirements, Challenges, and Designs Abedelaziz Mohaisen Eugene Y. Vasserman

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:10
739Cryptography / Education / Key management / Public key infrastructure / Public-key cryptography / Anthropology / Humanities / Public key certificate / Academic certificate / Political anthropology

DEPARTMENT of ANTHROPOLOGY Certificate in LAW AND POLICY The Certificate in Law and Policy is designed for students seeking expertise in the legal, political, and cultural dimensions of citizenship, democracy, immigratio

Add to Reading List

Source URL: www.anthropology.uci.edu

Language: English - Date: 2016-01-26 16:34:23
740Internet / Computing / Domain name system / Network architecture / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / OpenDNSSEC / Prague / .se

OpenDNSSEC 1.3 Matthijs Mekking NLnet Labs 26 Mar 2011

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2011-03-27 05:24:21
UPDATE