Encryption

Results: 4595



#Item
601Software / Instant messaging clients / Cross-platform software / Cryptographic software / Cryptography / Communication software / Threema / Internet privacy / Encryption / Secure messaging / Google Allo / Computer security

security ag – www.cnlab-security.ch Threema GmbH Staldenbachstrasse 11 CH-8808 Pfäffikon SZ

Add to Reading List

Source URL: threema.ch

Language: English - Date: 2015-11-30 08:43:10
602

Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption [Short Paper] Tristan Caulfield1 , Christos Ioannidis2 , and David Pym1 1 University College London

Add to Reading List

Source URL: fc16.ifca.ai

Language: English - Date: 2016-02-08 20:23:35
    603

    AEZ v3: Authenticated Encryption by Enciphering Viet Tung Hoang University of Maryland Georgetown University

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2015-08-29 19:31:43
      604

      1 Exploring the Feasibility of Fully Homomorphic Encryption Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar Worcester Polytechnic Institute

      Add to Reading List

      Source URL: ecewp.ece.wpi.edu

      Language: English - Date: 2012-12-31 09:45:43
        605Key management / Public key infrastructure / E-commerce / Transport Layer Security / Secure communication / CA/Browser Forum / Extended Validation Certificate / HTTPS / Public key certificate / Gmail / Certificate authority / Encryption

        Browser Interfaces and Extended Validation SSL Cer tificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada

        Add to Reading List

        Source URL: digitalpiglet.org

        Language: English - Date: 2009-11-27 08:29:52
        606Security / Cryptography / Prevention / Identity management / Public-key cryptography / Computer networking / Content centric networking / Access control / IBAC / Encryption

        Interest-Based Access Control in CCN Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood Department of Computer Science University of California Irvine

        Add to Reading List

        Source URL: conferences2.sigcomm.org

        Language: English - Date: 2015-10-03 12:09:18
        607

        Revocable Timed‐Release Encryption Dominique Unruh University of Tartu Dominique Unruh

        Add to Reading List

        Source URL: ec14.compute.dtu.dk

        Language: English - Date: 2014-05-16 06:26:28
          608Cryptography / Ciphertext indistinguishability / Semantic security / Chosen-ciphertext attack / Block cipher / Encryption / Feistel cipher / RSA / Ciphertext / Chosen-plaintext attack / Cipher / Advantage

          On Symmetric Encryption with Distinguishable Decryption Failures* Alexandra Boldyreva1 , Jean Paul Degabriele2 , Kenneth G. Paterson2 , and Martijn Stam3 2 1 Georgia Institute of Technology

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-06-25 11:49:37
          609

          Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology Encrypting smartphones and other tech products will help protect against malicious hacking, identity

          Add to Reading List

          Source URL: cdt.org

          Language: English - Date: 2014-11-10 17:17:00
            UPDATE