Digital signature

Results: 2653



#Item
41Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
42Group Signatures  David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.

Group Signatures David C h a m Eugtne van Heyst CWi Came for Mathematics and Computer Science, Kruislaan 413, 1098 SJ Amsterdam, The Netherlands.

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
43.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006  NLnet Labs document

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
44www.t hales-esecurity.com  SECURE YOUR CUSTOMERS’ ONLINE JOURNEY WITH A CENTRALIZED SOLUTION FOR QUALIFIED ELECTRONIC SIGNATURE 	 Solution Benefits •	Give your customers freedom to sign transactions and

www.t hales-esecurity.com SECURE YOUR CUSTOMERS’ ONLINE JOURNEY WITH A CENTRALIZED SOLUTION FOR QUALIFIED ELECTRONIC SIGNATURE Solution Benefits • Give your customers freedom to sign transactions and

Add to Reading List

Source URL: www.kyos.ch

Language: English - Date: 2016-07-26 10:21:56
45FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
46Proceedings  - NN - RFIDSec08

Proceedings - NN - RFIDSec08

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:40:17
47A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-03-28 14:11:04
48Steps for placing an Adobe Digital Signature on a MS Word Document using Adobe Acrobat Professional 10 or greater Open the MS Word file. For this 12 step process, I will be using Microsoft WordThe first step is

Steps for placing an Adobe Digital Signature on a MS Word Document using Adobe Acrobat Professional 10 or greater Open the MS Word file. For this 12 step process, I will be using Microsoft WordThe first step is

Add to Reading List

Source URL: armypubs.army.mil

Language: English - Date: 2014-09-16 10:31:36
49eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
50Proceedings  - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24