×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [insecure channel]
Reconstructing and Watermarking Stereo Vision Systems-PhD Presentation
144 views
Cryptology - Antônio Lacerda
390 views
Implementation of Various Cryptosystem Using Chaos
81 views
Overview of cryptography
68 views
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking
237 views
CSCI-1680 Security Based on lecture notes by Scott Shenker and Mike Freedman Andrew Ferguson
222 views
25th Feb 2009FSE1 1 Fast and Secure CBC-type MACs National Institute of Standards and Technology Mridul Nandi
[email protected]
214 views
Key and identity management with pgp Seth Hardy TASK 28 February 07
215 views
MIRJANA SEKULOVSKA, PhD, DEPUTY MINISTER OF INFORMATION SOCIETY AND ADMINISTRATION Republic of Macedonia Ministry of Information Society and Administration
219 views
Secure Authentication Using Biometric Data Karen Cui
218 views
CS526Topic 7: User Authentication1 Information Security CS 526 Topic 7: User Authentication
240 views
Email Security Pretty Good Privacy (PGP) S/MIME. Introduction Email is one of the most heavily used network-based application. There are two widely used
231 views
< Prev
Next >