Digital ID

Results: 917



#Item
181Key management / Finite fields / ID-based encryption / Group signature / XTR / RSA / Digital signature / Public key certificate / Cryptography / Public-key cryptography / Electronic commerce

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
182Digital electronics / Intel Corporation / Intel / Microprocessor / Computer hardware / Electronic engineering / Electronics

Intel Corporate Privacy Rules Deed Poll 23rd February, 2015 Intel Corporate Privacy Rules

Add to Reading List

Source URL: www.intel.co.id

Language: English - Date: 2015-03-06 19:17:48
183Wave mechanics / Doppler effect / Radar / Delay / Synthesizer / Wave / Sound effect / Index of wave articles / Pulse-Doppler radar / Waves / Sound / Calculus

Lab report 2 Vishal Paul Joy Student ID: Digital Audio Systems, DESC9115, SemesterMasters Program in Audio and Acoustics Faculty of Architecture, Design and Planning, The University of Sydney

Add to Reading List

Source URL: ses.library.usyd.edu.au

Language: English - Date: 2013-06-06 12:52:19
184Radio-frequency identification / Privacy / Wireless / Inventory / SAP Auto-ID Infrastructure / Technology / Business / Automatic identification and data capture

6 IT DECISIONS YOUR IT PEOPLE SHOULDN’T MAKE

Add to Reading List

Source URL: digital.mit.edu

Language: English - Date: 2007-10-03 14:37:00
185Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
186Id Quantique / Central Digital Television

USER CASE REDEFINING SECURITY Notenstein Private Bank Ltd. High-Speed Network for Disaster Recovery 10G Ethernet Backbone Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
187IP / Undeniable signature / ElGamal signature scheme / Rabin signature algorithm / Cryptography / Public-key cryptography / Digital signature

A Secure Modified ID-based Undeniable Signature Scheme Sherman S.M. Chow ∗ Lucas C.K. Hui S.M. Yiu Department of Computer Science University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-02-10 16:32:44
188ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree

Add to Reading List

Source URL: hms.isi.jhu.edu

Language: English - Date: 2013-01-28 17:13:20
189Technology / Web conferencing / Internet / World Wide Web / Hyperlink / Electronics / Digital media / Teleconferencing / Internet culture

Instructions for Accessing the NATTAP Webinar To connect to the web conference, go to < HYPERLINK "http://conference321.com/masteradmin/room.asp?id=rs0e572c05aff0" >http://conference321.com/masteradmin/room.asp?id=rs0e5

Add to Reading List

Source URL: www.resnaprojects.org

Language: English - Date: 2011-01-20 11:45:49
190Quake / Mobile games / Orcs / Fantasy tropes / John D. Carmack / Id Software / Elf / Binary Runtime Environment for Wireless / Digital media / Software / Fantasy

John Carmack Archive - .planhttp://www.team5150.com/~andrew/carmack March 18, 2007 Contents

Add to Reading List

Source URL: floodyberry.com

Language: English - Date: 2002-05-16 09:02:25
UPDATE