×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [oneway hash function]
Cryptographysecurity 1222867498937700-9
157 views
CH03-CompSec2e
20 views
Efficient Signature Generation by Smart Cards 20103112 Suk Ki Kim 20103114 Sunyeong Kim
215 views
Applications of Logic in Computer Security Jonathan Millen SRI International
216 views
Computer Science CSC 774Dr. Peng Ning CSC 774 Advanced Network Security Topic 2.5 Secret Handshake Slides by Tong Zhou
226 views
Chapter 3 User Authentication RFC 2828 RFC 2828 defines user authentication as: “The process of verifying an identity claimed by or for a system entity.”
237 views
An Efficient, Secure & Delegable Micro-Payment System Vishwas Patil
[email protected]
vtp School of Technology and Computer
218 views
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources
224 views
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
230 views
1 A provably secure secret handshake with dynamic controlled matching Alessandro Sorniotti, Refik Molva Computers and Security, Volume 29, Issue 5, July
222 views
Chapter 5 Internet Security Applications. 5.0 Internet Access §In a secure remote access system, it must ensure the privacy and integrity of data as it
216 views
1 Hash Function, Digital Signature & Public Key Infrastructure
225 views
Next >