×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [encrypted value]
TD Connections
33 views
Efficient Secure Query Evaluation over Encrypted XML Databases Wendy Hui Wang Laks V.S. Lakshmanan University of British Columbia, Canada
219 views
Windows Password Handling and Security Faults Nate Prosser Lenny Calabrese Travis Stitt
213 views
padding oracle attack
8.590 views
1 Security in Wireless Protocols Bluetooth, 802.11, ZigBee
218 views
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman
223 views
Security Issues in Grid Computing Presented by: Nisarg Gandhi Aritra Mukherjee Anirudh Sethi
215 views
Authentication Building Secure Protocols. Topics The Authentication Problem Simple Device Authentication Attack and Countermeasures Cryptographic Hash
228 views
Authentication
46 views
1 Detecting Logic Vulnerabilities in E- Commerce Applications Presenter: Liu Yin Slides Adapted from Fangqi Sun Computer Science Department College of
218 views