Public-key cryptography

Results: 11378



#Item
941Business / Credit card / Public key certificate / Cheque / Finance / Money / Credit card fraud / Payment systems / Electronic commerce / Public-key cryptography

Microsoft Word - Transcript Request sample draft

Add to Reading List

Source URL: www.academyart.edu

Language: English - Date: 2015-07-18 15:12:08
942Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
943RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
944Computing / Protection Profile / Key management / Public-key cryptography / Common Criteria / Electronic signature / Evaluation Assurance Level / Public key certificate / Integrity / Computer security / Evaluation / Security

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
945Key management / Certificate authorities / Secure communication / DigiCert / Certificate signing request / HTTP Secure / Public key certificate / X.509 / Comparison of SSL certificates for web servers / Cryptography / Cryptographic protocols / Public-key cryptography

Double Feature Talk 1) Intro to SSL 2) Git Basics for Devs & Designers SSL

Add to Reading List

Source URL: calgary.wordcamp.org

Language: English - Date: 2015-05-24 02:19:31
946Public-key cryptography / Computer security / Antivirus software / Phishing / Whitelist / Blacklist / Public key certificate / Certificate authority / HTTP Secure / Cryptography / Spamming / Key management

C:/Users/zhdong/Dropbox/Papers/ACSAC Poster/Certs_file.dvi

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2015-01-23 15:36:26
947Bitcoin / Applied mathematics / Cryptographic nonce / Proof-of-work system / Consensus / Byzantine fault tolerance / Public-key cryptography / Cryptographic hash function / Cryptography / Computing / Software

Overview Bitcoin Problems with Bitcoin?

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-10-22 02:47:23
948Quality / Public-key cryptography / Professional certification / ISO / Det Norske Veritas / Certification / Public key certificate / Standards / Evaluation / Quality management

Strålfors_AB_ISO_9001-2008_Certificate-MSC_1-13M5HRA_CC

Add to Reading List

Source URL: www.stralfors.dk

Language: English - Date: 2015-04-14 10:01:24
949Extended Validation Certificate / CA/Browser Forum / Public key certificate / Certificate authority / Phishing / Certificate policy / Revocation list / Public key infrastructure / S/MIME / Cryptography / Key management / Public-key cryptography

Microsoft Word - EV V1_5_4.doc

Add to Reading List

Source URL: cabforum.org

Language: English - Date: 2015-05-04 16:00:53
UPDATE