Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Security== | publisher=Clarkson University Department of Mathematics and Computer Science ...
    13 KB (1,730 words) - 04:20, 21 August 2023
  • ...Cheng.<ref>{{cite journal|last1=Chen|first1=L.|last2=Cheng|first2=Z.|title=Security proof of Sakai-Kasahara's identity-based encryption scheme|journal=Cryptogr There are four standards relating to this protocol: ...
    10 KB (1,576 words) - 07:26, 31 July 2024
  • ...y, be defeated using [[Shor's algorithm]] on a [[Quantum computing|quantum computer]] — some lattice-based constructions appear to be resistant to attack by bo ...quivalence].</ref> She then showed a [[cryptographic hash function]] whose security is equivalent to the computational hardness of SIS. ...
    24 KB (3,173 words) - 01:44, 18 February 2025
  • {{Short description|Surveillance or computer investigation}} ...uter_security)|computer exploits]] to analyze everything from the lowest [[computer memory|memory]] and [[central processing unit|CPU]] levels up to the highes ...
    16 KB (2,208 words) - 21:04, 3 August 2024
  • ...eneric term for constructions of [[cryptographic primitive]]s based on the security of [[hash function]]s. It is of interest as a type of [[post-quantum crypto ...of their use of one-time signature schemes. The US [[National Institute of Standards and Technology]] (NIST), specified that algorithms in its [[post-quantum cr ...
    20 KB (2,880 words) - 23:48, 23 December 2024
  • ...) is a network protocol designed for traffic safety applications. As other computer network protocols, it is also subject to several attacks that can have fata ...ts. IEEE Standards, July 2010.</ref> In VANET network protocol stack, WAVE standards defines mechanisms from Application Layer to Network Layer while IEEE 802.1 ...
    14 KB (2,173 words) - 20:35, 20 February 2025
  • ...rve]] used in [[elliptic-curve cryptography]] (ECC) offering 128 [[bits of security]] (256-bit [[key size]]) and designed for use with the [[Elliptic-curve Dif ...r.org/2007/286 | doi=10.1007/978-3-540-76900-2_3 | series=Lecture Notes in Computer Science | publisher=Springer | location=Berlin | conference=Advances in cry ...
    21 KB (2,850 words) - 01:51, 13 February 2025
  • ...k Cipher for Fast Encryption on Common Processors |series=Lecture Notes in Computer Science |date=2014 |volume=8267 |publisher=Springer International Publishin ...3246). LEA is included in the ISO/IEC 29192-2:2019 standard ([[Information security]] - Lightweight cryptography - Part 2: Block ciphers). ...
    19 KB (2,649 words) - 15:58, 26 January 2024
  • ...d to be faster than existing digital signature schemes without sacrificing security. It was developed by a team including [[Daniel J. Bernstein]], Niels Duif, | title=High-speed high-security signatures ...
    18 KB (2,639 words) - 09:04, 1 February 2025
  • {{Short description|Manufacturer of hotel security systems}} | industry = Security / hotel electronic door locks, in-room safes and energy management systems ...
    16 KB (2,225 words) - 20:43, 22 December 2024
  • ...=Moriai |editor1-first=S |series=Fast Software Encryption Lecture Notes in Computer Science |date=2013 |volume=8424 |pages=241–262 |doi=10.1007/978-3-662-43933 ...ocessing Standards (NIST FIPS)}}</ref> Although part of the same series of standards, SHA-3 is internally different from the [[MD5]]-like [[Davies-Meyer|structu ...
    52 KB (7,730 words) - 18:17, 7 February 2025
  • ...[decryption]] by national intelligence agencies, especially the [[National Security Agency]] (NSA).<ref>{{cite web|url=https://www.eff.org/document/crypto-wars ...lt with through case-by-case export license request proceedings brought by computer manufacturers, such as [[IBM]], and by their large corporate customers. ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • |certification = [[GOST]], and [[Federal Security Service|FSS]] |security claim = ...
    10 KB (1,355 words) - 18:37, 7 January 2025
  • ...dent identity cards from the local [[Public security bureau (China)|Public Security Bureau]], sub-bureaus or local executive police stations.<ref name="中华人民共和国 ...民共和国居民身份证条例(失效)【1985-09-06】]</ref> At that point, the [[Ministry of Public Security of the People's Republic of China]] created a unified authority responsible ...
    29 KB (3,655 words) - 15:31, 18 February 2025
  • ...apter=LSH: A New Fast Secure Hash Function Family |series=Lecture Notes in Computer Science |date=2015 |volume=8949 |publisher=Springer International Publishin == Security == ...
    44 KB (5,850 words) - 00:16, 21 July 2024
  • ...227-7 |editor-last=Agrawal |editor-first=Manindra |series=Lecture Notes in Computer Science |pages=1–19 |language=en |chapter=Differential Privacy: A Survey of ...chapter=Differential Privacy: A Survey of Results |series=Lecture Notes in Computer Science |date=2008 |volume=4978 |editor-last=Agrawal |editor-first=Manindra ...
    40 KB (5,735 words) - 18:35, 7 February 2025
  • ...quantum proof cryptography were left behind and replaced with established standards.<ref name=":11" /> A testnet for a follow-up update called Coordicide, or I .../www.zdnet.com/article/new-alliance-promotes-the-blockchain-to-improve-iot-security-trust/|url-status=live}}</ref> and Mobility Open Blockchain Initiative (MOB ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ...with some external information.<ref name=":82" /> For example, the social security number could be used to identify a specific user by adversaries,<ref name=" ...lems and their applications |title=Proceedings of the 2001 workshop on New security paradigms - NSPW '01 |pages=13 |year=2001 |last1=Du |first1=Wenliang |last2 ...
    55 KB (7,739 words) - 07:36, 21 December 2024
  • ...m to raise their overall fleet fuel economy levels to comply with the CAFE standards.<ref name=NHTS1>{{cite report |url=https://www.nhtsa.gov/sites/nhtsa.gov/fi ...s to be substantially non-petroleum based and has environmental and energy security benefits. Beginning in 1993, manufacturers of these other alternative fuel ...
    62 KB (8,973 words) - 19:51, 5 January 2025
  • ...hs, but network-model databases operate at a lower level of [[Abstraction (computer science)|abstraction]]<ref name="Gutierrez2">{{cite journal|last1=Angles|fi {{main|RDF (computer science)}} ...
    53 KB (7,551 words) - 02:45, 19 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)