×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secret value]
Cryptography-101
1.121 views
Software Security Technologies Richard Sinn Principal Architect / Security Architect, Yahoo, Inc Lecturer, SJSU
228 views
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University
214 views
Key Establishment Schemes Workshop Document October 2001
219 views
The Secret Value of the Social Inbox
83 views
How to Use Cryptography Properly: The Common Mistakes People Make When Using Cryptographic Functions
57 views
Authentication (ch 9~12) IT443 – Network Security Administration Instructor: Bo Sheng 1
236 views
Advanced Security Constructions and Key Management Class 16
214 views
Chapter3 Public-Key Cryptography and Message Authentication
256 views
Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Maziéres, Dan Boneh
231 views
Security Introduction Class 11 18 February 2003. Overview Security Properties Security Primitives Sample Protocols
219 views
Implementing e-Auctions with Sharemind Md. Sadek Ferdous 12th November 2008
217 views
Next >