John Key

Results: 597



#Item
81Internet standards / Regional Internet Registries / Internet in the United States / Internet governance / American Registry for Internet Numbers / Internet Protocol / IPv6 / IP address / Resource Public Key Infrastructure / Internet / Network architecture / Computing

1 ARIN: Our Mission, Role and Services John Curran

Add to Reading List

Source URL: www.arin.net

Language: English - Date: 2014-02-24 16:19:17
82Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

Add to Reading List

Source URL: nsrc.cse.psu.edu

Language: English - Date: 2015-04-16 15:07:31
83Looe Key / Key Largo / Carysfort Reef / French Reef / Grecian Rocks / Davis Reef / John Pennekamp Coral Reef State Park / Sand Key / Alligator Reef / Marine biology / Florida Keys / Florida

ditteke and andrew houseboat

Add to Reading List

Source URL: www.fla-keys.com

Language: English - Date: 2015-01-16 15:44:21
84Rekeying / Data management / Computing / Graph theory / B-tree / R-tree / Binary tree

1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2005-06-19 23:01:08
85Data security / File hosting / Cryptographic software / Data synchronization / Dropbox / Backup / Public-key cryptography / File system / Remote backup service / Computing / Cloud computing / Software

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
86Rekeying / Public-key cryptography / B-tree / Cryptography / Cryptographic protocols / Locksmithing

SEAL: A Secure Communication Library for Building Dynamic Group Key Agreement Applications ? Patrick P. C. Lee a John C. S. Lui b David K. Y. Yau c a Department of Computer Science, Columbia University, New York, NY 100

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-04-23 21:23:04
87Credit / Economics / Business / SME finance / Person-to-person lending / Bank / Mortgage industry of the United States / Financial economics

13th Report from John Trethowan 1. Report Overview (Press Release) In his 13th report, Trethowan observes three key trends: - The first reflects a recovering economy; the majority of the appeal requests for credit

Add to Reading List

Source URL: www.creditreview.ie

Language: English - Date: 2015-05-13 06:34:30
88Fremont /  California / Fremont / Stakeholder / Alameda County /  California / John George Psychiatric Pavilion / Geography of California / San Francisco Bay Area / San Leandro /  California

First Responder Focus Groups Invitation to Participate Alameda County Behavioral Health Care Services (BHCS) is seeking the participation of key stakeholders - including law enforcement, EMS, and Emergency Department rep

Add to Reading List

Source URL: www.acbhcs.org

Language: English - Date: 2015-04-10 11:28:30
89Cloud storage / File hosting / Data security / Web services / Backup / Amazon S3 / Public-key cryptography / Key management / Database / Computing / Network file systems / Cloud computing

FADE: Secure Overlay Cloud Storage with File Assured Deletion Yang Tang† , Patrick P. C. Lee† , John C. S. Lui† , and Radia Perlman‡ † The Chinese University of Hong Kong ‡ Intel Labs

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2010-10-18 05:22:07
90Network performance / Internet privacy / Proxy server / Cipher / RSA / Proxy re-encryption / Cryptography / Computing / Computer networking

1 A Multi-key Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design, and Implementation Siu F. Yeung, John C. S. Lui, Senior Member, IEEE, David K. Y. Yau, Member, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 10:49:44
UPDATE