Key distribution

Results: 988



#Item
51Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
52Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2015-12-08 11:13:38
53Local Policy on Key Distribution 1.0 Policy  It is recognized that keys to the union office need to be distributed to specific members

Local Policy on Key Distribution 1.0 Policy It is recognized that keys to the union office need to be distributed to specific members

Add to Reading List

Source URL: 2424.cupe.ca

Language: English - Date: 2013-03-01 12:17:20
54ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-23 01:39:57
55--  -- The Evolution of the Kerberos Authentication Service John T. Kohl

-- -- The Evolution of the Kerberos Authentication Service John T. Kohl

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2004-04-08 15:18:56
56FACULTY OF SCIENCE UNIVERSITY OF COPENHAGEN Master’s thesis Johannes Borregaard

FACULTY OF SCIENCE UNIVERSITY OF COPENHAGEN Master’s thesis Johannes Borregaard

Add to Reading List

Source URL: theoretical-quantum-optics.nbi.ku.dk

Language: English - Date: 2015-09-01 09:58:36
57PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

PS-1 Ultra Low-Power High-Speed Flexible Probabilistic Adder for Error-Tolerant Applications

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2013-12-16 08:28:50
58arXiv:1008.4593v2 [quant-ph] 4 MarHacking commercial quantum cryptography systems by tailored bright illumination Lars Lydersen,1, 2, a) Carlos Wiechers,3, 4, 5 Christoffer Wittmann,3, 4 Dominique Elser,3, 4 Johan

arXiv:1008.4593v2 [quant-ph] 4 MarHacking commercial quantum cryptography systems by tailored bright illumination Lars Lydersen,1, 2, a) Carlos Wiechers,3, 4, 5 Christoffer Wittmann,3, 4 Dominique Elser,3, 4 Johan

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2011-03-06 20:33:07
59LA-URTheory Component of the  Quantum Information Processing

LA-URTheory Component of the Quantum Information Processing

Add to Reading List

Source URL: qist.lanl.gov

Language: English - Date: 2004-04-06 17:14:00
60Low-complexity secret key distribution for Vehicular Networks Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and Jo˜ao Barros∗ ∗  Instituto de Telecomunicac¸o˜ es, Departamento de Engenharia Electr

Low-complexity secret key distribution for Vehicular Networks Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and Jo˜ao Barros∗ ∗ Instituto de Telecomunicac¸o˜ es, Departamento de Engenharia Electr

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:53:05