×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [cryptographic tools]
Documents
Fine-grained Private Matching for Proximity-based Mobile Social Networking INFOCOM 2012 Rui Zhang, Yanchao Zhang Jinyuan (Stella) Sun Arizona State University
215 views
Documents
120 January 2006 Cryptographic Tools Three basic tools are used – Encryption is used to provide confidentiality – Digital signatures are used to provide
218 views
Documents
CSCE 790G: Computer Network Security Chin-Tser Huang
[email protected]
University of South Carolina
216 views
Documents
Privacy Preserving K-means Clustering on Vertically Partitioned Data Presented by: Jaideep Vaidya Joint work: Prof. Chris Clifton
225 views
Documents
EE579T/5 #1 Spring 2003 © 2000-2003, Richard A. Stanley EE579T / CS525T Network Security 6: IPSec Prof. Richard A. Stanley
218 views
Documents
EE579T/6 #1 Spring 2002 © 2000-2002, Richard A. Stanley WPI EE579T / CS525T Network Security 6: IPSec Prof. Richard A. Stanley
220 views
Documents
1. 220 January 2006 Cryptographic Tools Three basic tools are used – Encryption is used to provide confidentiality – Digital signatures are used to provide
216 views
Documents
ECE738 Advanced Image Processing Data Hiding (1 of 3) Curtsey of Professor Min Wu Electrical & Computer Engineering Univ. of Maryland, College Park
214 views
Documents
Chapter 2
48 views
Documents
“He, who wants to defend everything, defends nothing.”
45 views
Documents
CSCE 715: Network Systems Security
32 views
Documents
1 “He, who wants to defend everything, defends nothing.” --- Frederick, the Great
224 views
Next >