Digital signature

Results: 2653



#Item
31

PDF Document

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
32Stakeholder Briefing OctoberStakeholder Information Session – Victoria.pptx)

Stakeholder Briefing OctoberStakeholder Information Session – Victoria.pptx)

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:41:53
33e-SignLive-logo-screen

e-SignLive-logo-screen

Add to Reading List

Source URL: www.esignlive.com

Language: English - Date: 2016-01-26 06:04:53
34ECC Summer School – Exercices Damien RobertCryptography  Implement public key encryption and signature with elliptic curves:

ECC Summer School – Exercices Damien RobertCryptography Implement public key encryption and signature with elliptic curves:

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-09-25 11:36:46
35Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
36Digital Signing Convenient and Compliant “Electronic signatures and digital signatures are not the same thing” Electronic Signatures

Digital Signing Convenient and Compliant “Electronic signatures and digital signatures are not the same thing” Electronic Signatures

Add to Reading List

Source URL: www.securedsigning.co.nz

Language: English - Date: 2016-08-03 20:04:41
37ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-19 14:59:40
38How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2016-05-24 15:16:00
39Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-10 09:46:08
40Law_on_Electronic_Signature

Law_on_Electronic_Signature

Add to Reading List

Source URL: www.nekretnine.co.me

Language: English - Date: 2013-07-17 07:56:10