Search
Selected: T

Transport Level Security: a proof using the Gong-Needham-Yahalom Logic

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Tree Parity Machine Rekeying Architectures

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Tree-formed Verification Data for Trusted Platforms

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trident, a new pseudo random number generator based on coupled chaotic maps

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust beyond reputation: A computational trust model based on stereotypes

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust Brokerage Systems for the Internet

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust enhancement by multiple random beacons

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trust for Location-based Authorisation

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted Certificates in Quantum Cryptography

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted Computing in Mobile Action

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted Ticket Systems and Applications

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

TrustMAS: Trusted Communication Platform for Multi-Agent Systems

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Trustworthy content push

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

TSET: Token based Secure Electronic Transaction

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

TulaFale: A Security Tool for Web Services

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Two Classes of Crooked Multinomials Inequivalent to Power Functions

Computer Science – Cryptography and Security
Scientific paper

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Two Dimensional Random Patterns

Computer Science – Cryptography and Security
Scientific paper

  [ 3.65 ] – good Voters 1   Comments 0
  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.