Encryption

Results: 4595



#Item
41Scaling Bitcoin MilanPeer-to-Peer Encryption and Authentication from the Perspective of End-Users _jonasschnelli_

Scaling Bitcoin MilanPeer-to-Peer Encryption and Authentication from the Perspective of End-Users _jonasschnelli_

Add to Reading List

Source URL: milan2016.scalingbitcoin.org

Language: English - Date: 2016-10-09 05:12:04
    42Privacy Policy KENYA TOURISM BOARD (KTB) values your trust and is committed to protecting your privacy. We use SSL encryption to protect your sensitive information online. This privacy policy is designed to inform you of

    Privacy Policy KENYA TOURISM BOARD (KTB) values your trust and is committed to protecting your privacy. We use SSL encryption to protect your sensitive information online. This privacy policy is designed to inform you of

    Add to Reading List

    Source URL: www.magicalkenya.com

    Language: English - Date: 2017-05-31 04:27:58
      43NEXt generation Techno-social Legal Encryption Access and Privacy  nextleap.eu Grant NoProject startedDuration 36 months.

      NEXt generation Techno-social Legal Encryption Access and Privacy nextleap.eu Grant NoProject startedDuration 36 months.

      Add to Reading List

      Source URL: nextleap.eu

      Language: English - Date: 2018-06-25 05:11:58
        44The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Summary for the non-expert The goal of this briefing was to demonstrate new attacks against HTTPS, the encryption technology used to protect all websites

        The BEAST Wins Again: Why TLS Keeps Failing to Protect HTTP Summary for the non-expert The goal of this briefing was to demonstrate new attacks against HTTPS, the encryption technology used to protect all websites

        Add to Reading List

        Source URL: bh.ht.vc

        Language: English - Date: 2014-08-06 17:45:47
          45No domain left behind: is Let’s Encrypt democratizing encryption? Maarten Aertsen1 , Maciej Korczy´ nski2 , Giovane C. M. Moura3 , Samaneh Tajalizadehkhoob2 , Jan van den Berg2

          No domain left behind: is Let’s Encrypt democratizing encryption? Maarten Aertsen1 , Maciej Korczy´ nski2 , Giovane C. M. Moura3 , Samaneh Tajalizadehkhoob2 , Jan van den Berg2

          Add to Reading List

          Source URL: www.sidnlabs.nl

          Language: English - Date: 2017-04-12 10:02:30
            46Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories  August 20, 1994 Abstract

            Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories August 20, 1994 Abstract

            Add to Reading List

            Source URL: www.mattblaze.org

            Language: English - Date: 2001-05-15 19:09:38
            47Combined Proxy Re-Encryption  Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

            Combined Proxy Re-Encryption Orange Labs, Applied Crypto Group, Université de Caen Basse-Normandie, GREYC, Sébastien Canard et Julien Devigne Journées C2 2012, Dinard

            Add to Reading List

            Source URL: webmath.univ-rennes1.fr

            Language: English - Date: 2016-03-14 12:25:52
              48SecureCopy3 FC Archive Encryption Product Overview Backup Media Encryption

              SecureCopy3 FC Archive Encryption Product Overview Backup Media Encryption

              Add to Reading List

              Source URL: www.disuk.com

              Language: English
                49672  IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 52, NO. 3, MARCH 2005 Additive Mixing Modulation for Public Key Encryption Based on Distributed Dynamics

                672 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 52, NO. 3, MARCH 2005 Additive Mixing Modulation for Public Key Encryption Based on Distributed Dynamics

                Add to Reading List

                Source URL: biocircuits.ucsd.edu

                Language: English - Date: 2013-10-11 13:37:11
                  50Breaking The FF3 FormatPreserving Encryption Standard Over Small Domains F. Betül Durak Serge Vaudenay

                  Breaking The FF3 FormatPreserving Encryption Standard Over Small Domains F. Betül Durak Serge Vaudenay

                  Add to Reading List

                  Source URL: rwc.iacr.org

                  Language: English - Date: 2018-01-13 06:28:10