Protocols

Results: 23793



#Item
141

TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Amir Rahmati UMass Amherst Mastooreh Salajegheh

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2012-07-12 13:12:13
    142

    Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

    Add to Reading List

    Source URL: jeapostrophe.github.io

    - Date: 2018-04-03 12:30:31
      143

      Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

      Add to Reading List

      Source URL: quantum-safe-crypto.quantumlah.org

      - Date: 2016-10-04 03:16:29
        144

        CMU SCSSpring 2018) :: Checkpoint Protocols

        Add to Reading List

        Source URL: 15721.courses.cs.cmu.edu

        - Date: 2018-04-03 19:20:48
          145

          Migrating from SSL and Early TLS A Resource Guide from the PCI Security Standards Council Is your organization still using Secure Sockets Layer (SSL)/early Transport Layer Security (TLS) protocols? Do you work with onli

          Add to Reading List

          Source URL: www.pcisecuritystandards.org

          - Date: 2018-02-14 10:22:15
            146

            Optimally Sound Sigma Protocols Under DCRA Helger Lipmaa University of Tartu, Tartu, Estonia Abstract. Given a well-chosen additively homomorphic cryptosystem and a ⌃ protocol with linear answer, Damg˚

            Add to Reading List

            Source URL: fc17.ifca.ai

            - Date: 2017-03-17 12:03:55
              147

              Programming and Proving with Distributed Protocols Disel: Distributed Separation Logic {P }

              Add to Reading List

              Source URL: ilyasergey.net

              - Date: 2018-03-26 18:04:22
                148

                TAIC PARTLinguistic Security Testing for Textual Protocols Authors Ben Kam, Tom Dean

                Add to Reading List

                Source URL: www2010.taicpart.org

                - Date: 2010-09-05 02:56:27
                  149

                  Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University

                  Add to Reading List

                  Source URL: jeapostrophe.github.io

                  - Date: 2018-04-03 12:30:31
                    150

                    Developing the Cyberinfrastructure for a National Archaeological Site Database Project Summary This project will for the first time develop protocols to integrate archaeological site file data from large areas of North A

                    Add to Reading List

                    Source URL: ux.opencontext.org

                    - Date: 2015-10-03 15:05:18
                      UPDATE