Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Carl H. W. Meyer"'
Publikováno v:
IEEE Transactions on Communications. 29:773-777
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be
Publikováno v:
Data Processing. 26:36-38
Recent reports of breaches in computer system security have created a heightened concern and interest in the vulnerability of computer systems. Cryptography is one method of combatting one problem of security. The article describes the two types of a
Publikováno v:
IEEE Symposium on Security and Privacy
In many applications of cryptography, assuring the authenticity of communications is as important as protecting their secrecy. A well known and secure method of providing message authentication is to compute a Message Authentication Code (MAC) by enc
Publikováno v:
IEEE Symposium on Security and Privacy
A set of required security criteria is developed which assures that the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card
Publikováno v:
IEEE Transactions on Communications. 29:1409-1409
Publikováno v:
ACM Transactions on Software Engineering & Methodology; Feb2024, Vol. 33 Issue 2, p1-28, 28p
Publikováno v:
2016 IEEE International Conference on Consumer Electronics (ICCE); 2016, p508-511, 4p
Autor:
Feller, Thomas
Publikováno v:
Trustworthy Reconfigurable Systems; 2014, p155-212, 58p
Publikováno v:
IOP Conference Series: Materials Science & Engineering; Dec2019, Vol. 674 Issue 1, p1-1, 1p
Autor:
Aurélien Onimus
« Aujourd'hui, les entreprises se tournent de plus en plus vers la blockchain pour la transparence et la sécurité offertes. De quoi s'agit-il? Pourquoi est-ce important? Comment ça marche? Aurélien Onimus donne les réponses à toutes ces questi