Home - Science - Cryptography |
Page 3 41-60 of 72 Back | 1 | 2 | 3 | 4 | Next 20 |
41. IBM Research | (none) | Redirect Lists group members, current research, recent publications, and speakers and other activities at the TJ Watson Research Center. http://www.research.ibm.com/security/ | |
|
42. Cryptography - Mono NET framework cryptography can be found under a number of namespaces in several assemblies. Mono also has it s own assemblies to provide missing security http://www.mono-project.com/Cryptography | |
|
43. ECS 227 - Modern Cryptography - Winter 2000 - Phillip Rogaway ECS 227 Modern cryptography - Winter 2000. Topic for Lecture 18 (Tuseday, 3/7/00). Digital signatures. General Information. Course Information Sheet http://www.cs.ucdavis.edu/~rogaway/classes/227/winter00/ | |
|
44. Glossary For Internet Cryptography Basic Web glossary of Internet cryptography terms, from the book `Internet cryptography by Richard E. Smith. http://www.smat.us/crypto/inet-crypto/glossary.html | |
|
45. Web Pages Of Interest To Cryptography Researchers This page started out as a list of cryptography researchers home pages, but has been expanded to include links to things that are of interest to people http://www.swcp.com/~mccurley/cryptographers/cryptographers.html | |
|
46. Cryptography : City In The Sky Implementations by Dave Barton of many of the most useful symmetric encryption algorithms (Blowfish, Twofish, IDEA, Rijndael, and Serpent) and message http://www.cityinthesky.co.uk/cryptography.html | |
|
47. Malicious Cryptography, Part One This twopart article series looks at how cryptography is a double-edged sword it is used to make us safer, but it is also being used for malicious http://www.securityfocus.com/infocus/1865 | |
|
48. SourceForge.net: Software Map sourceforge.net/softwaremap/trove_list.php?form_cat=44 Similar pages Bibliography of Quantum cryptographyThis paper provides an extensive annotated bibliography of papers that have been written on quantum cryptography and related topics. http://sourceforge.net/softwaremap/trove_list.php?form_cat=44 |
49. System.Security.Cryptography Namespace () The cryptography namespace provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, http://msdn2.microsoft.com/en-us/library/system.security.cryptography.aspx | |
|
50. Fact Sheet NSA Suite B Cryptography Official NSA site. Cryptographic standards, research, and resources. http://www.nsa.gov/ia/industry/crypto_suite_b.cfm | |
|
51. Netsurfer Focus On Cryptography And Privacy cryptography in the computer age typically involves the translation of the original message into a new and incomprehensible one by a mathematical algorithm http://www.netsurf.com/nsf/v01/03/nsf.01.03.html | |
|
52. The Cryptography Project www.cosc.georgetown.edu/~denning/crypto/ Similar pages IFCAThe International Financial cryptography Association (IFCA) was formed to advance the theory and practice of financial cryptography and related fields. http://www.cosc.georgetown.edu/~denning/crypto/ | |
|
53. International Cryptography Freedom Jim Choate recommends that cryptography documentation be mirrored to encourage understanding and creation of strong encryption the best assurance that it http://jya.com/crypto-free.htm | |
|
54. Applied Cryptography And Network Security (ACNS) 2008 The 6th International Conference on Applied cryptography and Network Security will bring together industry and academic researchers interested in the http://acns2008.cs.columbia.edu/ |
55. Foundations Of Cryptography - A Two-volume Book cryptography is concerned with the construction of schemes that withstand any abuse Such schemes are constructed so to maintain a desired functionality, http://www.wisdom.weizmann.ac.il/~oded/foc-book.html | |
|
56. Quantum Information Science And Technology Roadmapping Project The purpose of the quantum cryptography roadmap is to help facilitate the progress Please email comments on the quantum cryptography roadmap to Richard http://qist.lanl.gov/qcrypt_map.shtml | |
|
57. Java SE Security This page contains Security as related to Java SE. http://java.sun.com/javase/technologies/security/ | |
|
58. Cryptography's Role In Securing The Information Society 1 GROWING VULNERABILITY IN THE INFORMATION AGE 2 cryptography ROLES, MARKET, AND INFRASTRUCTURE 3 NEEDS FOR ACCESS TO ENCRYPTED INFORMATION http://www.nap.edu/readingroom/books/crisis/ | |
|
59. Center For Cryptography, Computer And Network Security Center for cryptography, Computer and Network Security at University of WisconsinMilwaukee. http://www.cccns.uwm.edu/ | |
|
60. Handbook Of Applied Cryptography This site provides order information, updates, errata, supplementary information, chapter bibliographies, and other information for the 1996 CRC Handbook of http://www.dms.auburn.edu/hac/ | |
|
Page 3 41-60 of 72 Back | 1 | 2 | 3 | 4 | Next 20 |