Encryption

Results: 4595



#Item
901

™ EncryPtion Can you figure out the encrypted message? If you need a little help, just flip the paper upside down. The answer is at the bottom.

Add to Reading List

Source URL: www.bookitprogram.com

- Date: 2014-07-23 12:45:25
    902RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

    An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-02-05 01:02:43
    903Cryptographic protocols / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Zero-knowledge proof / X Window System / PP / Homomorphic encryption / Cryptography / Software / Computing

    How to Use Bitcoin to Incentivize Correct Computations Ranjit Kumaresan and Iddo Bentov Technion, Haifa, Israel {ranjit | idddo }@cs.technion.ac.il

    Add to Reading List

    Source URL: www.cs.technion.ac.il

    Language: English - Date: 2014-09-01 09:06:37
    904Cryptographic protocols / Data / Wireless networking / Computer network security / Advanced Encryption Standard / ZigBee / IPsec / Block cipher modes of operation / IEEE 802.15.4 / Cryptography / Computing / IEEE 802

    Security Considerations for IEEENetworks Naveen Sastry David Wagner University of California, Berkeley

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:45
    905

    OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

    Add to Reading List

    Source URL: www.ironmountain.rs

    Language: English
      906Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

      Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2010-11-25 08:58:28
      907

      End-to-End Encryption in Cloud Services Patrick Linskey © 2011 Cisco and/or its affiliates. All rights reserved.

      Add to Reading List

      Source URL: gotocon.com

      Language: English - Date: 2015-05-11 19:27:34
        908

        Synthesis of Public-Key Encryption Schemes Gilles Barthe1 , Juan Manuel Crespo1 , Martin Gagn´e2 , C´esar Kunz1,3 , and Yassine Lakhnech2 1 IMDEA

        Add to Reading List

        Source URL: csf2012.seas.harvard.edu

        Language: English - Date: 2012-07-05 18:15:12
          909Key management / Keychain / Software / Key / Disk encryption / FileVault / KeePass / Cryptography / Mac OS X / Cryptographic software

          Keychain Analysis with Mac OS X Memory Forensics Kyeongsik Lee1, Hyungjoon Koo2 Defense Cyber Warfare Technology Center, Agency for Defense Development, Sonpa P.O Box 132, Seoul, Republic of Korea Center for Information

          Add to Reading List

          Source URL: forensic.n0fate.com

          Language: English - Date: 2013-11-29 01:40:12
          910

          Analysis of the WinZip Encryption Method Tadayoshi Kohno

          Add to Reading List

          Source URL: www.cs.jhu.edu

            UPDATE