RSA

Results: 5605



#Item
291

NEWS RELEASE ALABAMA DEPARTMENT OF PUBLIC HEALTH RSA Tower 201 Monroe Street, Suite 914 Montgomery, ALPhoneFax

Add to Reading List

Source URL: www.adph.org

Language: English - Date: 2015-08-05 11:59:20
    292

    RSA DISTRIBUTED CREDENTIAL PROTECTION There is a security weakness lurking in many of today’s best designed systems – a primary point of compromise. Think about your own IT operations. Chances are that by breaching j

    Add to Reading List

    Source URL: www.emc.com

    Language: English
      293Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

      CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

      Add to Reading List

      Source URL: www.certicom.com

      Language: English - Date: 2010-11-08 15:42:56
      294

      Defining Strong Privacy for RFID Ari Juels RSA Security M Bedford, MA, USA

      Add to Reading List

      Source URL: www.arijuels.com

      Language: English - Date: 2013-09-23 13:04:09
        295English phonology / English orthography / Index of Abkhazia-related articles

        A n n u a l R e p o r tu n ive rsa l h e a lth c a r e fo u n dati o n o f co n n ec ti cut Universal Health care Foundation of Connecticut Annual Report 2007

        Add to Reading List

        Source URL: universalhealthct.org

        Language: English - Date: 2013-05-13 15:53:08
        296

        A New RSA-Based Signature Scheme ¨ ¨ Schwenk Sven Schage, Jorg ¨

        Add to Reading List

        Source URL: 2010.africacrypt.com

        Language: English - Date: 2010-05-24 11:31:52
          297

          A Fuzzy Vault Scheme Ari Juels1 and Madhu Sudan2 1 RSA Laboratories Bedford, MA 01730, USA E-mail:

          Add to Reading List

          Source URL: www.arijuels.com

          Language: English - Date: 2013-09-23 14:42:17
            298

            Exploring Implicit Memory for Painless Password Recovery Tamara Denning,†∗ Kevin Bowers,† Marten van Dijk,† and Ari Juels† RSA Labs,† University of Washington∗ , {kevin.bowers, mar

            Add to Reading List

            Source URL: www.arijuels.com

            Language: English - Date: 2013-09-22 13:28:28
              299Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

              STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

              Add to Reading List

              Source URL: www.daemonology.net

              Language: English - Date: 2009-06-11 07:29:01
              300

              How to Choose Secret Parameters for RSA and its Extensions to Elliptic Curves [Published in Designs, Codes and Cryptography 23(3):297–316, Marc Joye1, Jean-Jacques Quisquater2 , and Tsuyoshi Takagi3 1

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:44:00
                UPDATE