Transient-key cryptography

Results: 3



#Item
1Information / Internet protocols / Password-authenticated key agreement / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
2Cryptographic protocols / Key / Data security / Digital signature / Public key certificate / Trusted timestamping / Transient-key cryptography / Implicit certificate / Cryptography / Key management / Public-key cryptography

Secure… Cryptographic Time-Stamps Through Transient Key Technology By: Paul Doyle of ProofSpace

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
3Public-key cryptography / Electronic commerce / Key management / Public key certificate

County of Placer Administrative Service Department Revenue Services Division[removed]Justice Center Drive, Suite100, Roseville CA[removed]Ph: ([removed]‐3900 Fax: ([removed]‐3910 Request to Close Transient Occupancy Tax Ce

Add to Reading List

Source URL: www.placer.ca.gov

Language: English - Date: 2013-08-05 14:47:15
UPDATE