Public-key cryptography

Results: 11378



#Item
721Cryptography / Quality assurance / Business / Evaluation / Accreditation / Standards / United Kingdom Accreditation Service / Vehicle Certification Agency / Public key certificate / FANUC / Professional certification

C ER T IF IC AT E OF R E G I S T R AT IO N

Add to Reading List

Source URL: robomachine.fanucamerica.com

Language: English - Date: 2015-09-18 10:43:52
722

Modeling High-Level Public-Key Cryptography in Coq Andres Erbsen May 17,

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2015-06-14 19:45:36
    723Software / Graphics software / Free software / Digital signature / Key management / Public-key cryptography / Records management technology / Signature / SK-1 / SK1 / PK

    Graded  Signatures   Murat  Osmanoglu   joint  work  with  Aggelos  Kiayias  and  Qiang  Tang   a  pe==on  system  

    Add to Reading List

    Source URL: isc2015.item.ntnu.no

    Language: English - Date: 2015-09-15 05:28:59
    724Cryptography / Economy / Financial services / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / Transcript / Cheque

    Microsoft Word - CEUCertificateandTranscriptRequestForm

    Add to Reading List

    Source URL: naspweb.com

    Language: English - Date: 2015-04-29 17:06:04
    725Cryptography / Computing / Dining cryptographers problem / Public-key cryptography / Crowds / Communications protocol / Anonymity / Tor

    Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

    Add to Reading List

    Source URL: ohmygodel.com

    Language: English - Date: 2014-08-17 14:48:08
    726Cryptography / Quality assurance / Evaluation / Business / Accreditation / Standards / United Kingdom Accreditation Service / Vehicle Certification Agency / Public key certificate / FANUC / Professional certification

    C ER T IF IC AT E OF R E G I S T R AT IO N

    Add to Reading List

    Source URL: robot.fanucamerica.com

    Language: English - Date: 2015-09-18 10:33:59
    727Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

    CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2010-11-08 15:42:56
    728Computing / Network protocols / Message-oriented middleware / Distributed computing architecture / Computer networking / Content centric networking / Email / Publishsubscribe pattern / Hypertext Transfer Protocol / Public-key cryptography

    Demo:Content-based Push/Pull Message Dissemination for Disaster Message Board Tomohiko Yagyu Kenichi Nakamura

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:44:44
    729Alan Turing / Cryptography / Turing machine / Computability theory / Models of computation / Codebreaker / Public-key cryptography / Known-plaintext attack / Cipher / Turing / Encryption / Cryptanalysis

    ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

    Add to Reading List

    Source URL: www.cs4fn.org

    Language: English - Date: 2012-11-21 11:20:28
    UPDATE