Key signature

Results: 1754



#Item
121

Signature Based Intrusion Detection using Latent Semantic Analysis Jean-Louis Lassez, Ryan Rossi, Stephen Sheel, and Srinivas Mukkamala Abstract We address the problem of selecting and extracting key features by using si

Add to Reading List

Source URL: www.ryanrossi.com

Language: English - Date: 2012-03-02 07:08:35
    122Public-key cryptography / Digital signature / Group signature / Ring signature / Key / Cryptography

    Anonymous and Publicly Linkable Reputation Systems (Short Paper) Johannes Bl¨ omer? , Jakob Juhnke?? , and Christina Kolb? University of Paderborn,Department of Computer Science,Germany {bloemer,jakob.juhnke,christina.k

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:38
    123Cryptography / Public-key cryptography / Elliptic curve cryptography / Computer networking / Named data networking / Key management / Digital signature / RSA / Elliptic Curve Digital Signature Algorithm / Secure Shell / Type-length-value / Digital Signature Algorithm

    Moderator-controlled Information Sharing by Identity-based Aggregate Signatures for Information Centric Networking Tohru Asami The University of Tokyo

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:49
    124Records management technology / Signature / Biometrics / Digital signature / Public-key cryptography

    Texas A&M University at Qatar

    Add to Reading List

    Source URL: www.qatar.tamu.edu

    Language: English - Date: 2015-10-15 04:34:38
    125Cryptography / Identity documents / Vital statistics / Genealogy / Marriage / Gender transitioning / Name change / Birth certificate / Divorce / Documentation / Marriage license / Public key certificate

    OFFICE OF RECORDS Name Change Request Form in o This form must be filled out with Adobe Acrobat and then printed for signature. Name Change request must be accompanied by cceptable legal documentation as defined below.

    Add to Reading List

    Source URL: www.qatar.tamu.edu

    Language: English - Date: 2015-10-15 04:34:38
    126Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

    Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

    Add to Reading List

    Source URL: people.redhat.com

    Language: English - Date: 2015-09-02 09:27:18
    127Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

    NIST Special Publication

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-06-10 13:59:58
    128Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

    Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:58
    129Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / Digital signature / Domain Name System Security Extensions / Self-signed certificate / Witness

    arXiv:1503.08768v2 [cs.CR] 23 NovKeeping Authorities “Honest or Bust” with Decentralized Witness Cosigning Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2015-11-23 23:32:06
    130

    Implementing Multivariate Quadratic Public Key Signature Schemes on Embedded Devices

    Add to Reading List

    Source URL: www.emsec.rub.de

    Language: English - Date: 2012-10-11 02:29:54
      UPDATE