Strong cryptography

Results: 135



#Item
41Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-21 04:48:54
42Legal Weight Electronic Signatures Cut Cost  Strong Security

Legal Weight Electronic Signatures Cut Cost Strong Security

Add to Reading List

Source URL: www.securemetric.com

Language: English - Date: 2014-05-28 02:53:53
43Advanced Authentication Methods: Software vs. Hardware

Advanced Authentication Methods: Software vs. Hardware

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-26 09:39:23
44The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
45How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
46Proc.  HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
47Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Why strong Validation processes for SSL are essential for the preservation of trust in the Internet economy Weak validation processes undermine the value of SSL as a trust enabling technology

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:24
48Reverse Engineering of Strong CryptoSignatures Schemes

Reverse Engineering of Strong CryptoSignatures Schemes

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:56
49An Introduction to Cryptography Copyright © [removed]Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 6.0

An Introduction to Cryptography Copyright © [removed]Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. PGP*, Version 6.0

Add to Reading List

Source URL: cdn.preterhuman.net

Language: English - Date: 2012-10-01 15:16:15
50Tip Sheet  Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Tip Sheet Creating strong, safe passwords Ensuring the security of multiple online accounts might seem like a big task, but it’s really important you don’t use the same password for everything. Data breaches of well

Add to Reading List

Source URL: www.accan.org.au

Language: English - Date: 2015-03-05 20:32:56