×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [keyed hash function]
Home >
keyed hash function
Securing Wireless Cellular Systems
8.144 views
Lecture 2 crypto and basics of protocols
276 views
Digital signature Brief Introduction
139 views
1 Adaptive Witness Encryption and Asymmetric Password-based Cryptography PKC 2015 March 31, 2015 Mihir Bellare UC San Diego Viet Tung Hoang University.
244 views
Cisco Solution Technology Integrator Криптография: основные понятия и алгоритмы Рябко С.Д., к.ф.-м.н. СТАНДАРТ СЕТЕВОЙ
225 views
Cross-Domain Privacy-Preserving Collaborative Firewall Optimization Fei Chen Computer Science and Engineering Michigan State University Joint work with.
213 views
Authenticated Key Exchange I. Definitions I. MAP I. matching conversations II. oracles II. (I)KA II. AKEP2 III. AKEP2 Security I. Session Keys II. Perfect.
217 views
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
23 views
Cross-Domain Privacy-Preserving Collaborative Firewall Optimization
24 views
Chapter 11 Cryptographic Hash Functions. “Each of the messages, like each one he had ever read of Stern's commands, began with a number and ended with.
221 views
Chaos Based Direct Public Verifiable Signcryption Scheme
58 views