Steven

Results: 11791



#Item
11Cryptography / Cyberwarfare / Computer security / Clipper chip / Key escrow / Crypto Wars / Strong cryptography / National Security Agency / Escrow / Computer network / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
12Cryptography / Post-quantum cryptography / Lattice-based cryptography / Computational hardness assumptions / Ring learning with errors / Learning with errors / Digital signature / Hash function / Multivariate random variable / Normal distribution / RSA / Entropy

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
13

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
    14

    0375 LAW AND ECONOMICS IN TAIWAN Steven S. Kan Professor at the Department of Economics National Tsing Hua University, Hsin Chu, Taiwan © Copyright 1999 Steven S. Kan

    Add to Reading List

    Source URL: reference.findlaw.com

    Language: English - Date: 2018-08-16 18:06:25
      15

      USPAS – Simulation of Beam and Plasma Systems Steven M. Lund, Jean-Luc Vay, Remi Lehe, Daniel Winklehner and David L. Bruhwiler Lecture: Coherent Synchrotron Radiation

      Add to Reading List

      Source URL: people.nscl.msu.edu

      Language: English - Date: 2018-01-23 12:51:00
        16

        Steven Chanenson, J.D. As the Director of the Villanova Sentencing Workshop and former Chair of the Pennsylvania Commission on Sentencing, Steve Chanenson brings an innovative approach to the study of sentencing and crim

        Add to Reading List

        Source URL: thenasc.org

        Language: English
          17

          Logo Created by Steven E. Floyd Downloadable on the internet at www.mntrecc.net Project made possible through a grant from D.H.S.

          Add to Reading List

          Source URL: www.mntrecc.net

          Language: English - Date: 2012-12-05 15:46:46
            18

            A Look Back at “Security Problems in the TCP/IP Protocol Suite” Steven M. Bellovin AT&T Labs—Research Abstract About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol s

            Add to Reading List

            Source URL: css.csail.mit.edu

            Language: English - Date: 2016-01-29 11:49:51
              19

              Customizable and Extensible Deployment for Mobile/Cloud Applications Irene Zhang Adriana Szekeres Dana Van Aken Isaac Ackerman Steven D. Gribble∗

              Add to Reading List

              Source URL: sapphire.cs.washington.edu

              Language: English - Date: 2014-11-09 16:12:09
                20

                Reverse-engineering Online Tracking From niche research field to easy-to-use tool Steven Englehardt webtap.princeton.edu

                Add to Reading List

                Source URL: senglehardt.com

                  UPDATE