×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [encryption scheme]
Home >
encryption scheme
Introduction to Modern Cryptography - Perfectly-Secret Encryption
79 views
Black-Box Construction of a Non-malleable Encryption Scheme ...
1.141 views
Digital signature
739 views
BLUEtooth Batch 4
113 views
WiFi Secuiry: Attack & Defence
110 views
Classical cryptography1
150 views
Classical cryptography
152 views
security in wireless sensor networks
350 views
POSTECH ITEC559 Su 03 1 ITEC559 Secure Internet Protocols Lecture 1 POSTECH Prof. Jong Kim © 2003 JKIM@POSTECH.
218 views
Public Key Infrastructure and Applications. Agenda PKI Overview Digital Signatures What is it? How does it work? Digital Certificates Public Key Infrastructure.
216 views
Doc.: IEEE 802.11-98/178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE 802.11e Security IEEE 802.11 Task Group.
214 views
Network Security Essentials Chapter 2 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
215 views
Next >