Encryption

Results: 4595



#Item
731

On the Joint Security of Encryption and Signature in EMV? Jean Paul Degabriele1 , Anja Lehmann2 , Kenneth G. Paterson1 , Nigel P. Smart3 , and Mario Strefler4 1 Information Security Group, Royal Holloway, University of

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2011-12-17 12:03:31
    732

    Secure USB 3.0 Desktop Hard Drive The world’s first PIN operated desktop hard drive with built-in hardware encryption and capacities of up to 8TB. Looking for the highest level of security for your data while utilising

    Add to Reading List

    Source URL: www.istorage-uk.com

    Language: English - Date: 2016-01-12 18:42:49
      733

      Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert Georgia Institute of Technology

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-08 16:32:01
        734

        Peculiar Properties of Lattice-Based Encryption Chris Peikert Georgia Institute of Technology Public Key Cryptography

        Add to Reading List

        Source URL: web.eecs.umich.edu

        Language: English - Date: 2015-09-08 16:32:09
          735Cryptography / Prevention / Security / Lundin / Entropy / Encryption / Information security / Key

          Guesswork and Entropy as Security Measures for Selective Encryption Reine Lundin Faculty of Economic Sciences, Communication and IT

          Add to Reading List

          Source URL: kau.diva-portal.org

          Language: English - Date: 2012-09-04 10:52:07
          736

          Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

          Add to Reading List

          Source URL: www.uncg.edu

          Language: English - Date: 2009-10-01 15:00:03
            737

            Functional Encryption for Regular Languages Brent Waters University of Texas at Austin Abstract

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2012-07-10 16:49:22
              738

              OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

              Add to Reading List

              Source URL: www.ironmountain.com.ua

              Language: English
                739

                Lessons Learned in Implementing and Deploying Crypto Software Peter Gutmann University of Auckland Abstract Although the basic building blocks for working with strong encryption have become fairly widespread in the last

                Add to Reading List

                Source URL: www.cs.auckland.ac.nz

                Language: English - Date: 2006-07-06 01:29:50
                  740

                  Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption Amit Sahai∗, UCLA Hakan Seyalioglu†, UCLA

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  Language: English - Date: 2012-08-01 12:12:58
                    UPDATE