Uploads
Contact
/
Login
Upload
Search Results for 'Secure Encryption'
Topic 7:
alida-meadow
Sunitha Samuel
danika-pritchard
Chapter 1 – Introduction
briana-ranney
Homomorphic Encryption
cheryl-pisano
Information Security – Theory vs. Reality
olivia-moreira
A Presentation
calandra-battersby
Cross-
debby-jeon
1 Rekeying for
alexa-scheidler
MACs Towards More Secure and More Ecient Constructions
mitsue-stanley
Research Data and Secure Storage Options
mitsue-stanley
Scaling Secure Computation Using the Cloud
debby-jeon
Secrets & Lies, Knowledge & Trust.
pasty-toler
Domain 1 - Security and Risk Management
olivia-moreira
Introduction to Information Security
trish-goza
Odds and ends
karlyn-bohler
Windows Phone 8 Security deep dive
cheryl-pisano
Data Security
alida-meadow
A Decade of Secure, Hosted
debby-jeon
Roxio Secure solutions Rob Griffith
marina-yarberry
MiniLEGO : Efficient Secure Two-Party Computation From General Assumptions
danika-pritchard
Basic Cryptography
kittie-lecroy
How to Use Bitcoin to Enhance Secure Computation
pasty-toler
Putting it all together: using multiple primitives together
myesha-ticknor
DEUCE: Write-Efficient Encryption for
pamella-moone
2
3
4
5
6
7
8
9
10
11
12