×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [security parameter]
Business
Cyber Security Defense-in-Depth Control Pyramid part 1 explanation
1.140 views
Documents
Slides
280 views
Education
Chapter 28
303 views
Technology
Ibe weil pairing
573 views
Documents
Lecture 10 Signature Schemes Stefan Dziembowski MIM UW 7.12.12ver 1.0
220 views
Documents
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena
220 views
Documents
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown
223 views
Documents
SECURITY ISSUES IN NETWORKS WITH INTERNET ACCESS PRESENTED BY Sri Vallabh Aida Janciragic Sashidhar Reddy
217 views
Documents
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology
220 views
Documents
1 Provable Security Sebastian Faust Ruhr-Universität Bochum, Germany
223 views
Documents
Standard Security Does Not Imply Security Against Selective-Opening Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek (UCSD, UCSD, UT Austin, U
217 views
Documents
Rennes, 15/10/2014 Cristina Onete
[email protected]
Message authenticity: Digital Signatures
217 views
< Prev
Next >