Secure transmission

Results: 298



#Item
1International Journal of Control and Automation Vol. 6, No. 2, April, 2013 IOT Secure Transmission Based on Integration of IBE and PKI/CA Liu Yang1,2*, Peng Yu2, Wang Bailing1, Bai Xuefeng1, Yuan Xinling1 and Li Geng1 1

International Journal of Control and Automation Vol. 6, No. 2, April, 2013 IOT Secure Transmission Based on Integration of IBE and PKI/CA Liu Yang1,2*, Peng Yu2, Wang Bailing1, Bai Xuefeng1, Yuan Xinling1 and Li Geng1 1

Add to Reading List

Source URL: www.sersc.org

- Date: 2013-04-24 23:55:35
    2Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

    Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

    Add to Reading List

    Source URL: work.debayangupta.com

    Language: English - Date: 2014-06-25 08:00:47
    3  	
   Inform ation regarding the declaration of consent: ImpactDOCK Hamburg collects, processes, stores and uses the personal data provided by the immigrant based on the questionnaire. Disclosure of this information i

        Inform ation regarding the declaration of consent: ImpactDOCK Hamburg collects, processes, stores and uses the personal data provided by the immigrant based on the questionnaire. Disclosure of this information i

    Add to Reading List

    Source URL: impactdock.de

    Language: English - Date: 2016-07-29 08:37:09
    4Abstract  Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

    Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2004-07-28 23:00:33
    5Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

    Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
    6Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track  T. Dierks

    Network Working Group Request for Comments: 4346 Obsoletes: 2246 Category: Standards Track T. Dierks

    Add to Reading List

    Source URL: iaoc.ietf.org

    Language: English - Date: 2016-02-04 15:25:49
    7A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

    A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    Language: English - Date: 2006-03-28 14:11:04
    8Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

    Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

    Add to Reading List

    Source URL: www.fkerschbaum.org

    Language: English - Date: 2011-09-10 05:30:51
    9Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Station Sameer Muftah Amar Asayh Department of Electronics and Communication J.K Institute of Applied Physics and Technology University of A

    Energy Efficient Schemes for Wireless Sensor Networks with Multiple Mobile Base Station Sameer Muftah Amar Asayh Department of Electronics and Communication J.K Institute of Applied Physics and Technology University of A

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-01-08 00:09:30
    10Microsoft Word - IBSS&K Engineering.doc

    Microsoft Word - IBSS&K Engineering.doc

    Add to Reading List

    Source URL: foibg.com

    Language: English - Date: 2015-02-02 08:46:10