Cryptography

Results: 21893



#Item
961JOURNAL  OF COMPUTER AND SYSTEM SCIENCES

JOURNAL OF COMPUTER AND SYSTEM SCIENCES

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
962Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
963Certificate of Certification Orion Registrar, Inc. This is to cer fy the Quality Management System of: AxXis Corpora on 1535 Nandina Avenue

Certificate of Certification Orion Registrar, Inc. This is to cer fy the Quality Management System of: AxXis Corpora on 1535 Nandina Avenue

Add to Reading List

Source URL: axxiscorp.us

Language: English - Date: 2016-06-03 17:38:32
964A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2  Florida State University

A Survey of Confidential Data Storage and Deletion Methods SARAH M. DIESBURG and AN-I ANDY WANG 2 Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-12-02 09:59:21
965ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
966DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

DNSSEC Raising the Barriers against DNS exploits Olaf M. Kolkman ()

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:03
967EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
968IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBERScantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:38
969Investigating Security-Related Behaviors Among Computer Users With Motor Impairments John D’Arcy Jinjuan Feng

Investigating Security-Related Behaviors Among Computer Users With Motor Impairments John D’Arcy Jinjuan Feng

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 09:39:54
970Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10