×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [keyed hash]
Home >
keyed hash
Ch11
868 views
Analysis of an Internet Voting Protocol Dale Neal Garrett Smith.
220 views
Outline Project 1 Hash functions and its application on security Modern cryptographic hash functions and message digest –MD5 –SHA.
221 views
Gaurav Lahoti University of Illinois at Urbana-Champaign, IL, USA Daisuke Mashima Wei-Peng Chen Fujitsu Laboratories of America Inc., USA Customer-centric.
214 views
Formal Derivation of Security Protocols Anupam DattaAnte Derek John C. Mitchell Dusko Pavlovic Stanford University Kestrel Institute HCSS April 15, 2004.
214 views
Abstraction and Refinement in Protocol Derivation Anupam DattaAnte Derek John C. Mitchell Dusko Pavlovic Stanford University Kestrel Institute CSFW June.
217 views
Cryptography and Network Security Hash Algorithms.
241 views
Thoughts on the Formal Modeling of Security of Sensor Networks Catherine Meadows Center for High Assurance Computer Systems Naval Research Laboratory Washington,
212 views
Security Introduction Class 11 18 February 2003. Overview Security Properties Security Primitives Sample Protocols.
219 views
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions
31 views
Customer-centric Energy Usage Data Management and Sharing in Smart Grid Systems
28 views