Digital signature

Results: 2653



#Item
61Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
62Legal documents / Computing / Legal release / Email / Internet / Zip / Signature block / Model release / Gramophone record / Cyberspace

Model Release Agreement I, (print name)_____________________(the “Model”), hereby grant permission to _______________ (the “Author”)to take and use photographs/digital images, videotape, and/or audio recordings

Add to Reading List

Source URL: www.andreas.com

Language: English - Date: 2014-08-13 15:55:34
63Digital media / Technology / Computing / Mobile phone / New media / Telephony / Email / Signature block

REGISTRATION FORMSCHOOL YEAR R.E.A.D.Y. PROGRAM Student’s Last Name First

Add to Reading List

Source URL: www.readyprogram.org

Language: English - Date: 2014-08-08 15:08:30
64Cryptography / Signature / Cryptography standards / Computer law / Key management / Public-key cryptography / Electronic signature / EIDAS / Qualified electronic signature / Digital signature / PAdES / Biometrics

Much More Than Capturing a Signature Get Documents Signed. Anywhere. Any time. The E-Signature Solution Based on Open PDF Standards and True Digital Signatures.

Add to Reading List

Source URL: konferencje.alebank.pl

Language: English - Date: 2016-06-09 10:27:46
65Computer law / Signature / Cryptography / Cryptography standards / Government / Privacy / Security / Regulation / EIDAS / Electronic signature / Information privacy / Internet privacy

EEMA online June 2015 Issue 11 EEMA news EEMA’s 28th Annual Conference: Digital Enterprise Europe: Only one week to go! Bringing Trust to the Hyperconnected World: Seize Opportunities and Manage Risk

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
66Cryptography / Public-key cryptography / Finite fields / Ciphertext indistinguishability / Digital signature / Oblivious transfer / Communications protocol / Random oracle / XTR / RSA / Commitment scheme / Advantage

The Simplest Protocol for Oblivious Transfer Tung Chou1 and Claudio Orlandi2 1 Technische Universieit Eindhoven 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-06-04 01:58:11
67Pig farming / Comment / Digital signature / Tax assessment / Information / Computing / Data

  Technical Evaluation Record  v1 April 2016  QUALIFICATION:  Indoor Pig Farrowing Operations 

Add to Reading List

Source URL: www.nptc.org.uk

Language: English
68Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
69Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Keystore / Key / Encryption / Digital signature / Certificate authority / PKCS

Private Key Management Version: 1.1 Global Payments Europe, s.r.o. Created

Add to Reading List

Source URL: www.gpwebpay.cz

Language: English - Date: 2016-08-01 14:50:14
70Cryptography / Public-key cryptography / Secure communication / Financial cryptography / Cryptographic protocols / Privacy-enhancing technologies / Digital signature / Proxy server / Internet privacy / Anonymity / Enhanced privacy ID / Pseudonymity

Making a Nymbler Nymble using VERBS (Extended Version) Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:14
UPDATE