Public-key cryptography

Results: 11378



#Item
591Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
592Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
593Biometrics / Computer law / Cryptography / Public-key cryptography / Signature / ESign / Electronic Signatures in Global and National Commerce Act / Electronic signature / Aadhaar / Digital signature / DigiLocker / Electronic authentication

GOVERNMENT OF INDIA Ministry of Communications & Information Technology Department of Electronics & Information Technology Controller of Certifying Authorities eSign – Online Electronic

Add to Reading List

Source URL: digilocker.gov.in

Language: English - Date: 2016-08-18 03:15:06
594File sharing / Public-key cryptography / Cryptography / Dark web / Darknet / WASTE / Peer-to-peer / Public key fingerprint / Usability / Key / Internet / Friend-to-friend

Establishing Darknet Connections: An Evaluation of Usability and Security John Bethencourt Wai Yong Low

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
595Homeomorphisms / Homomorphic encryption / Public-key cryptography / Cryptography / Encryption

Outsourcing Computations to the Cloud Advisor(s): Daniel Slamanig, David Derler Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
596Key management / Public-key cryptography / E-commerce / Records management technology / Signature / Public key certificate / Academic degree / Graduate certificate / Digital signature

Microsoft Word - Graduate Certificate Coversheet 2007.doc

Add to Reading List

Source URL: gfs.missouri.edu

Language: English - Date: 2013-02-04 11:52:05
597Key management / Public-key cryptography / Public key infrastructure / Certificate authorities / E-commerce / Symantec / Public key certificate / Domain name

Symantec Verification Overview .BANK Verification Symantec Proprietary & Confidential Symantec Verification Overview for .BANK – v4 (19 January 2016)

Add to Reading List

Source URL: www.ftld.com

Language: English - Date: 2016-08-03 17:21:54
598Cryptography / Disk encryption / Cryptographic software / Public-key cryptography / Data security / Encryption / Linear Tape-Open / IEEE P1619 / Symmetric-key algorithm / Magnetic tape data storage / Cipher / Key

Silverton Consulting, Inc. StorInt™ Briefing An examination of information security issues, methods and securing data with LTO-4 tape drive encryption Introduction

Add to Reading List

Source URL: www.lto.org

Language: English - Date: 2014-09-08 23:31:20
599Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
600Public-key cryptography / Public key infrastructure / Cryptography / Ko / Certificate authority / End-to-end encryption

Efficient Key Authentication Service for Secure End-to-end Communications Mohammad Etemad Alptekin Küpçü

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
UPDATE