Encryption

Results: 4595



#Item
791

CS: Schedule of Readings September 4, 2012 Tu, 28 Aug Needham and Schroeder, Using Encryption for Authentication in Large Networks of Computers. CACM, Decpapers/ needhamSchroeder78.pdf

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2012-09-04 07:45:26
    792Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

    ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

    Add to Reading List

    Source URL: esorics2015.sba-research.org

    Language: English - Date: 2015-09-22 04:03:47
    793Cryptography / Cloud computing / Key management / Public-key cryptography / Cloud computing security / Computer security / Encryption / Symmetric-key algorithm / Key / Disk encryption / Database encryption

    Microsoft PowerPoint - Copy of slides.ppt

    Add to Reading List

    Source URL: digitalpiglet.org

    Language: English - Date: 2009-11-27 08:33:14
    794

    personal Easy to use and affordable USB Flash Drive Designed for everyday use, the iStorage datAshur Personal secure flash drive, employing PIN access with hardware encryption. The datAshur Personal® provides peace of m

    Add to Reading List

    Source URL: www.istorage-uk.com

    Language: English - Date: 2015-08-06 11:15:29
      795

      Trapdoors for Lattices: Signatures, ID-Based Encryption, and Beyond Chris Peikert Georgia Institute of Technology

      Add to Reading List

      Source URL: www.di.ens.fr

      Language: English - Date: 2010-05-29 17:36:29
        796Search algorithms / Discrete geometry / Cryptography / K-nearest neighbors algorithm / Voronoi diagram / Encryption / Recommender system / Homomorphic encryption / NN / Nearest neighbor search

        Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li Richard Shin Vern Paxson

        Add to Reading List

        Source URL: www.eecs.berkeley.edu

        Language: English - Date: 2015-07-29 20:02:16
        797

        Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures? Fabrice Benhamouda1 , Jan Camenisch2 , Stephan Krenn2 , Vadim Lyubashevsky3,1 , Gregory Neven2 1

        Add to Reading List

        Source URL: www.di.ens.fr

        Language: English - Date: 2014-09-29 05:31:58
          798

          cuHE: A Homomorphic Encryption Accelerator Library Wei Dai and Berk Sunar Worcester Polytechnic Institute, Worcester, Massachusetts, USA Abstract. We introduce a CUDA GPU library to accelerate evaluations with homomorph

          Add to Reading List

          Source URL: ecewp.ece.wpi.edu

          Language: English - Date: 2015-08-30 00:22:57
            799Internet privacy / Secure communication / Computer networking / Cryptographic protocols / Transport Layer Security / Proxy server / Transmission Control Protocol / HTTPS / Internet protocol suite / Session Initiation Protocol

            Informing Protocol Design Through Crowdsourcing: the Case of Pervasive Encryption Anna Maria Mandalari Marcelo Bagnulo

            Add to Reading List

            Source URL: irtf.org

            Language: English - Date: 2016-01-05 05:04:04
            800

            Separating Sources for Encryption and Secret Sharing Yevgeniy Dodis NYU Krzysztof Pietrzak

            Add to Reading List

            Source URL: research.ihost.com

            Language: English - Date: 2006-03-28 15:48:52
              UPDATE