Deniable encryption

Results: 24



#Item
1The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability  The challenge

The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

Add to Reading List

Source URL: esec-lab.sogeti.com

Language: English - Date: 2016-07-01 12:08:46
2Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin 1,?  , Jesper Buus Nielsen

Lower and Upper Bounds for Deniable Public-Key Encryption Rikke Bendlin 1,? , Jesper Buus Nielsen

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-13 08:16:55
    3Introduction to Securing Data in Transit  Jennifer Vesperman  2002−02−24 Revision History

    Introduction to Securing Data in Transit Jennifer Vesperman 2002−02−24 Revision History

    Add to Reading List

    Source URL: ldp.pakuni.net

    Language: English - Date: 2002-03-20 10:51:36
    4Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1  Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

    Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols Jue-Sam Chou1 , Yalin Chen 2 , Ming-De Yang 3 1 Department of Information Management, Nanhua University Chiayi 622 Taiwan, R.O.C

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2005-12-09 06:49:50
    5On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

    On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-28 09:46:16
    6Microsoft Word - DA standarden.doc

    Microsoft Word - DA standarden.doc

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-20 21:30:21
    7Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

    Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds Piotr K. Tysowski Dept. of Electrical & Computer Engineering University of Waterloo Waterloo, Ontario, Canada

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-09 11:25:14
    8The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability  The challenge

    The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challenge

    Add to Reading List

    Source URL: cansecwest.com

    Language: English - Date: 2008-06-12 15:35:33
    9Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗

    Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗

    Add to Reading List

    Source URL: www.cs.washington.edu

    Language: English - Date: 2008-07-16 12:26:51
    10Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗

    Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31