×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [insecure channel]
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
148 views
Cryptology - Antônio Lacerda
396 views
Implementation of Various Cryptosystem Using Chaos
83 views
Overview of cryptography
68 views
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking
245 views
CSCI-1680 Security Based on lecture notes by Scott Shenker and Mike Freedman Andrew Ferguson
224 views
25th Feb 2009FSE1 1 Fast and Secure CBC-type MACs National Institute of Standards and Technology Mridul Nandi
[email protected]
215 views
Key and identity management with pgp Seth Hardy TASK 28 February 07
217 views
MIRJANA SEKULOVSKA, PhD, DEPUTY MINISTER OF INFORMATION SOCIETY AND ADMINISTRATION Republic of Macedonia Ministry of Information Society and Administration
219 views
Secure Authentication Using Biometric Data Karen Cui
226 views
CS526Topic 7: User Authentication1 Information Security CS 526 Topic 7: User Authentication
247 views
Email Security Pretty Good Privacy (PGP) S/MIME. Introduction Email is one of the most heavily used network-based application. There are two widely used
238 views
< Prev
Next >