Transient-key cryptography
Results: 3
# | Item |
---|---|
1![]() | Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-01-05 05:22:56 |
2![]() | Secure… Cryptographic Time-Stamps Through Transient Key Technology By: Paul Doyle of ProofSpaceAdd to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2007-09-25 01:00:00 |
3![]() | County of Placer Administrative Service Department Revenue Services Division[removed]Justice Center Drive, Suite100, Roseville CA[removed]Ph: ([removed]‐3900 Fax: ([removed]‐3910 Request to Close Transient Occupancy Tax CeAdd to Reading ListSource URL: www.placer.ca.govLanguage: English - Date: 2013-08-05 14:47:15 |