Digital signature

Results: 2653



#Item
161Cryptography / Key management / Public-key cryptography / Signature / E-commerce / Procurement / Digital signature / Melbourne City Centre / E-procurement / Paperless office

Yarra Ranges Council Speeds-Up Procurement’s Contract Signing with Secured Signing Challenge: Solution: “Timeframes for signature of Evaluation

Add to Reading List

Source URL: ds.securedsigning.com

Language: English - Date: 2016-04-07 01:01:35
162Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-20 08:39:27
163Signature / Electronic documents / Public-key cryptography / Notary / Records management technology / Email / Digital signature / Signature block / Course credit

REGISTRATION REQUEST FOR GRADUATE CREDIT Non-degree students DIRECTIONS—Use this form if you are a non-degree student who is not actively enrolled in a University degree program; needs coursework to appear on a graduat

Add to Reading List

Source URL: policy.umn.edu

Language: English - Date: 2015-12-30 11:17:55
164Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
165Cryptography / Public-key cryptography / Electric power / Microcontrollers / Smart grid / Smart meter / Electricity meter / Zero-knowledge proof / Commitment scheme / Digital signature / Elliptic curve cryptography / TI MSP430

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Andres Molina-Markham, George Danezis† , Kevin Fu, Prashant Shenoy, and David Irwin University of Massachusetts Amherst †

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
166Cryptography / Public-key cryptography / Cryptographic protocol / Transmission Control Protocol / Digital signature / Communications protocol

UNIVERSITY OF CALIFORNIA, IRVINE Sharing Sensitive Information with Privacy DISSERTATION

Add to Reading List

Source URL: emilianodc.com

Language: English - Date: 2014-11-28 06:44:18
167Cryptography / Public-key cryptography / Balls into bins / Bin / Digital signature / Powerball

Bounds and Improvements for BiBa Signature Schemes Michael Mitzenmacher and Adrian Perrig

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2002-02-08 16:53:24
168Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Key management / Domain name system / Internet Standards / Domain Name System Security Extensions / OpenDNSSEC / Digital signature / Time to live

Flexible and Robust Key Rollover in DNSSEC Yuri Schaeffer, Benno Overeinder, and Matthijs Mekking NLnet Labs, Amsterdam, The Netherlands Email: {yuri,benno,matthijs}@NLnetLabs.nl Abstract—DNSSEC security extensions ma

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2012-03-28 10:36:44
169Public-key cryptography / Cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Digital signature / Commitment scheme / NP / Random oracle / Mathematical proof / Markov chain

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
170Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

Add to Reading List

Source URL: www-verimag.imag.fr

Language: English - Date: 2007-10-18 09:44:59
UPDATE