ID-based encryption

Results: 182



#Item
41EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 17:41:07
42Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Improved Side Channel Attacks on Pairing Based Cryptography Johannes Blömer∗ Peter Günther†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-24 04:01:18
43ID-based Authenticated Two Round Multi-Party Key Agreement

ID-based Authenticated Two Round Multi-Party Key Agreement

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-20 20:23:11
44USER CASE REDEFINING SECURITY QKD as a Service Colt & IDQ provide Managed Quantum Cryptography Service for high-security network encryption in Switzerland

USER CASE REDEFINING SECURITY QKD as a Service Colt & IDQ provide Managed Quantum Cryptography Service for high-security network encryption in Switzerland

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
45Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang, Dengguo Feng, State Key Laboratory of Information Security Institute of Software, Chinese Academy of Sciences, Beijing, P.R.China zfzhan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-11-30 05:02:16
46DATA CENTER  Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

DATA CENTER Encryption Solution Design and Deployment Considerations This Encryption Solution Design and Deployment Considerations reference guide is designed to help customers and partners

Add to Reading List

Source URL: www.brocade.com

Language: English - Date: 2014-10-16 13:08:00
47» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

» GROUP TEST l Email security There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette. T

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-03-17 20:00:10
48User-Level_S:MIME Encryption

User-Level_S:MIME Encryption

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-05-24 15:35:31
49Data Sheet  SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE  OVERVIEW

Data Sheet SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE OVERVIEW

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2007-09-14 14:24:07
50Data Sheet  SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE  OVERVIEW

Data Sheet SeNDMAIL ENCRYPTION Policy-Based Encryption with Voltage IBE OVERVIEW

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2007-09-14 14:24:07