„Data Encryption.“
Suchergebnisse
7.742 Treffer
-
Constructions of optimal Ferrers diagram rank metric codes
-
Survey on Image Encryption Schemes, Bio cryptography and Efficient Encryption Algorithms
-
Remove key escrow from the BF and Gentry identity-based encryption with non-interactive key generation
-
Content-based filtering of Web documents: the MaX system and the EUFORBIA project
-
Zheng and Seberry’s public key encryption scheme revisited
-
Networked cryptographic devices resilient to capture
-
Analysis of e-commerce protocols: Adapting a traditional technique
-
An attack on the isomorphisms of polynomials problem with one secret
-
Automated analysis of timed security: a case study on web privacy
-
Preface to the special issue on Security in global computing
-
Using ambients to control resources
-
A calculus for control flow analysis of security protocols
-
Stack inspection and secure program transformations
-
Two-party generation of DSA signatures
-
Certificate revocation system implementation based on the Merkle hash tree
-
Preface to the special issue on PKI
-
All sail, no anchor II: Acceptable high-end PKI
-
PKI design based on the use of on-line certification authorities
-
Theory and benefits of recursive certificate structures
-
Generating visible RSA public keys for PKI