Spelling suggestions: "subject:"publickey"" "subject:"publickeys""
21 |
Design and development of a web-based DOD PKI common access card (CAC) instructional tool /Athanasopoulos, Vasileios D. January 2004 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Cynthia E. Irvine, J.D. Fulp, Glenn R. Cook. Includes bibliographical references (p. 79-80). Also available online.
|
22 |
Secure private key management in adaptable public key infrastructuresWiesmaier, Alexander January 2008 (has links)
Zugl.: Darmstadt, Techn. Univ., Diss., 2008
|
23 |
The secrets behind cryptography : a mathematical overviewPovondra, Amy Becker 05 January 2011 (has links)
Daily advancements in technology influence many aspects of society. In today’s political and economic era, the need for secure, computerized convenience is apparent. Cryptosystems play a major role for everyone, from an individual making an online purchase to the government communicating with an ally during wartime. As technology advances, so do cryptosystems. The author of this paper discusses different types of cryptosystems, from substitution ciphers to public key cryptography, and introduces the mathematical foundations of such systems. / text
|
24 |
Flexible certificate management in public key infrastructuresKaratsiolis, Evangelos. Unknown Date (has links) (PDF)
Darmstadt, Techn. University, Diss., 2007.
|
25 |
Sicheres Übergangsloses RoamingHaisch, Michael. Unknown Date (has links)
Techn. Universiẗat, Diss., 2007--Darmstadt.
|
26 |
Formale Modellierung von Authentifizierungs- und Autorisierungsinfrastrukturen : Authentizität von deskriptiven Attributen und Privilegien auf der Basis digitaler Zertifikate /Wölfl, Thomas. January 2006 (has links)
Universiẗat, Diss., 2006--Regensburg.
|
27 |
A smart card based authentication system for peer and group modelChan, Tak-fai, Dan. January 2008 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2009. / Includes bibliographical references (p. 63-70) Also available in print.
|
28 |
An analysis of key generation efficiency of rsa cryptos ystem in distributed environments/Çağrıcı, Gökhan. Koltuksuz, Ahmet January 2005 (has links) (PDF)
Thesis (Master)--İzmir Institute of Technology, İzmir, 2005. / Keywords: Cryptosystem, rivest-Shamir-Adleman, parallel computing, parallel algorithms, Random number. Includes bibliographical references (leaves. 68).
|
29 |
Untersuchung aktueller Sicherheitsmodelle bezüglich ihrer Eignung für den elektronischen HandelMusleh, Jens. January 2001 (has links)
Stuttgart, Univ., Diplomarb., 2001.
|
30 |
Enhancements of the non-linear knapsack cryptosystem : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Science at the University of Canterbury /Tu, Zhiqi. January 2006 (has links)
Thesis (M. Sc.)--University of Canterbury, 2006. / Typescript (photocopy). Includes bibliographical references (p. [93]-98). Also available via the World Wide Web.
|
Page generated in 0.0349 seconds