Cryptography

Results: 21893



#Item
781Cryptography / Steganography / Mathematics / Steganalysis / Digital watermarking / JPEG / Error detection and correction / Subliminal channel / Embedding / Bit error rate / Steganography tools / Steganographic file system

A Secure Robust Image Steganographic Model  Yeuan-Kuen Lee and Ling-Hwei Chen Department of Computer and Information Science National Chiao Tung University, Hsinchu 30050, Taiwan, R.O.C. email: .

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
782Cryptography / Computing / Information technology / Business intelligence / Server / Server hardware / Certificate authority / Parallel Virtual File System / Clientserver model

Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments* Joesph JaJa joseph@ umiacs.umd.edu

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2008-09-10 19:12:57
783Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-07-08 14:07:07
784E-commerce / Payment systems / Joachim von zur Gathen / Ecash / Cryptographic protocol / Communications protocol / Cryptography / Economy / Money

Microsoft Word - Modulhandbuch-MI-esecurity-2012.doc

Add to Reading List

Source URL: cosec.bit.uni-bonn.de

Language: English - Date: 2014-02-03 06:03:57
785Cryptography / Cryptographic engineering / USENIX / Cryptographic protocol / Institute for Applied Information Processing and Communications / Zero-knowledge proof / Communications protocol

Crypto Compiler Advisor(s): David Derler, Christian Hanser, Daniel Slamanig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
786Computer security / Security / Computing / Computer network security / Crime prevention / Cryptography / National security / FireEye / Digital Guardian / Cloud computing security / Forcepoint / Threat

SCAWARDS2014_honor_Horizontal

Add to Reading List

Source URL: static.webvid.co.uk

Language: English - Date: 2016-06-09 13:10:01
787Quantum cryptography / Theoretical computer science / Quantum information science / Cryptography / Quantum mechanics / Emerging technologies / Quantum computing / Applied mathematics / Quantum key distribution / Squeezed coherent state / Decoy state

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-07-27 17:15:17
788Business / Security / Computing / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Telecommuting / Technical support

IT Specialist – 8035 Page 1 City and Borough Sitka, Alaska

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2015-12-02 20:55:30
789Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
790Cryptography / Modular arithmetic / Zero-knowledge proof / Quadratic residue / RSA / FeigeFiatShamir identification scheme / IP / Public-key cryptography

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
UPDATE