Cryptography

Results: 21893



#Item
851Cryptography / Professional certification in finance / Certified Financial Planner / Chartered Financial Consultant / Public key certificate

35 Selegie Road #10-01 Parklane Shopping Mall SingaporeTel: Fax: Email: www.ifpas.org.sg

Add to Reading List

Source URL: www.ifpas.org.sg

Language: English - Date: 2016-05-22 12:09:18
852Mathematical analysis / Mathematics / Modular arithmetic / Computer arithmetic / Multiplication / Elliptic curve cryptography / Residue number system / Pi / 2N / Multiplication algorithm / Key size

1 A Randomized Multi-modulo RNS Architecture for Double-and-Add in ECC to prevent Power Analysis Side Channel Attacks Jude Angelo Ambrose†

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2013-12-23 08:24:26
853Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
854Cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Semantic security / Cryptosystem / RSA / Data Encryption Standard

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
855Security / Business / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Senior management / Unipart

Press Contact Joran Thompson FOR IMMEDIATE RELEASE 

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-02-01 18:01:19
856Cryptography / Standards organizations / Product certification / Quality management / SAI Global / Professional certification / Illinois Tool Works / Public key certificate / Sai

Microsoft Word - 025236_QMS_ENG RR

Add to Reading List

Source URL: www.sextoncan.com

Language: English - Date: 2016-06-01 16:51:30
857Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Cybercrime / Vulnerability / Operating system / Computing / Authorization

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Students Adopted: May 24, 2002 _______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 15:55:46
858Cryptography / Security / Idiap Research Institute / Martigny / Surveillance / Civil law common law) / Biometrics / BioWatch / CSEM / Authentication / Neuchtel

Microsoft Word - CP16-Biowave_EN_pdfversion

Add to Reading List

Source URL: www.biowatch.ch

Language: English - Date: 2016-02-05 11:08:35
859Cryptography / Disk encryption / Cryptographic software / Serial ATA / Block cipher mode of operation / Key / Encryption / BestCrypt / Hardware-based full disk encryption

X-Wall MX Introduction

Add to Reading List

Source URL: www.enovatech.com

Language: English - Date: 2015-08-12 02:55:36
860Computing / Internet / Cryptography / Anonymity / Dark web / Anonymous remailer / Email / Pseudonymity / Internet privacy / Tor / Dining cryptographers problem

Defining  “Anonymity”  in  Networked   Communication,  version  1   Joan  Feigenbaum1   Technical  Report  YALEU/DCS/TR-­‐1448   December  2011    

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-01-20 15:00:46
UPDATE