Secrecy

Results: 11054



#Item
361Computability theory / Lambda calculus / Theoretical computer science / Regression analysis / Computer science / Mathematics / Classical cipher

Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus Andrew D. Gordon1 and Alan Jeffrey2? 1 2

Add to Reading List

Source URL: ect.bell-labs.com

Language: English - Date: 2010-12-15 21:36:25
362Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
363Authentication protocols / Symmetric-key cryptography / Computer network security / IP / Kerberos / NeedhamSchroeder protocol / Cryptography

Secrecy Analysis in Protocol Composition Logic? Arnab Roy1 , Anupam Datta1 , Ante Derek1 , John C. Mitchell1 , Jean-Pierre Seifert2 1 2

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2010-07-17 01:14:15
364

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2014-05-19 03:40:02
    365Cryptography / Public-key cryptography / Ciphertext indistinguishability / Cryptographic protocols / Cryptographic software / Chosen-ciphertext attack / RSA / Key exchange / Advantage / CryptoVerif / Semantic security / Strong secrecy

    PDF Document

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-16 06:52:57
    366United States government secrecy / Government / Security / National security / Secrecy / Espionage / Classified information in the United States / United States Office of Personnel Management / Security clearance / E-QIP / L clearance / Single Scope Background Investigation

    PDF Document

    Add to Reading List

    Source URL: about.clearancejobs.com

    Language: English
    367Finance / Money / Economy / Banking / Primary dealers / Saxo Bank / UBS / Bank secrecy / Contract for difference

    PDF Document

    Add to Reading List

    Source URL: ch.saxobank.com

    Language: English - Date: 2014-07-14 03:41:22
    368

    Secrecy Analysis in Protocol Composition Logic Arnab ROY a , Anupam DATTA b , Ante DEREK c , John C. MITCHELL a , and Jean-Pierre SEIFERT d a Stanford University, USA

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:16
      369

      Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing CISPA, Saarland University, Germany {backes@cs, aniket@mmci, meiser@cs, tim.ruff

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-02 11:21:02
        370Mental health / Confidentiality / Journalism sourcing / Secrecy / Health Insurance Portability and Accountability Act / Psychotherapy / Medical record / Primary care ethics / Health / Ethics / Medicine

        Practice Policies and Consent for Services Welcome to my practice. Your first visit to a new therapist is very important, and you may have many questions. This letter is to introduce myself and give you information to he

        Add to Reading List

        Source URL: www.drshirleypakdaman.com

        Language: English - Date: 2014-09-12 18:52:45
        UPDATE