Vector Security

Results: 220



#Item
51New York Society of Security Analysts / Financial planning / CFA Institute / Chartered Financial Analyst

nyssa_logo_vector_color562

Add to Reading List

Source URL: www.nyssa.org

Language: English - Date: 2012-11-13 14:50:55
52Technology / Routing algorithms / Routing protocols / Routing / Mobile ad hoc network / Geographic routing / Delay-tolerant networking / Distance-vector routing protocol / Link-state routing protocol / Wireless networking / Network architecture / Computing

Routing and Security in Vehicular Networking Routing and Security in Vehicular Networking Di Yan, diyan at go.wustl.edu (A paper written under the guidance of Prof. Raj Jain)

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2013-12-20 19:02:15
53IEEE 802.11 / Wireless networking / Stream ciphers / RC4 / Wired Equivalent Privacy / Initialization vector / Wireless access point / Keystream / Fluhrer /  Mantin and Shamir attack / Cryptography / Cryptographic protocols / Computer network security

Analysis ofSecurity or Wired Equivalent Privacy Isn’t Nikita Borisov, Ian Goldberg, and David Wagner

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 04:44:47
54Block cipher / Ciphertext / Keystream / Initialization vector / Cryptography / Stream ciphers / Block cipher modes of operation

COMPUTER SCIENCE TRIPOS Part IB – 2014 – Paper 4 9 Security I (MGK) Block ciphers usually process 64 or 128-bit blocks at a time. To illustrate how their modes of operation work, we can use instead a pseudo-random pe

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:43
55Hydrology / Irrigation / Agriculture and the environment / Comprehensive Assessment of Water Management in Agriculture / Water resources / Food security / Wheat / Water stress / Rice / Environment / Water / Agriculture

The path to success is not a single vector from the current status Artist: Nathanael Kang, Malaysia 3

Add to Reading List

Source URL: www.iwmi.cgiar.org

Language: English - Date: 2013-07-05 15:56:04
56Equivalence relation / Differential cryptanalysis / Differential equation / ICE / Function / Vector space / Equivalence of categories / Algebra / Mathematics / Linear cryptanalysis

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT Wentao Zhang1 , Zhenzhen Bao1 , Vincent Rijmen2 , Meicheng Liu1 1.State Key Laboratory of Information Security, Institu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 23:46:18
57Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
58Block cipher modes of operation / Block cipher / Ciphertext / Transport Layer Security / Padding oracle attack / Plaintext / Cryptography / Chosen-plaintext attack / Initialization vector

A Perfect CRIME? TIME Will Tell Tal Be’ery, Web research TL Agenda §  BEAST +  Modes of operation

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-03-05 14:25:50
59Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: nerdoholic.org

Language: English - Date: 2013-02-18 19:54:05
60Initialization vector / Known-plaintext attack / Stream cipher / Ciphertext / Cipher / Chosen-plaintext attack / Wireless Transport Layer Security / Transport Layer Security / Cryptography / Espionage / Cyberwarfare

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:38
UPDATE