Results 241 to 250 of about 2,456,516 (297)
Bioinspired Injection Therapy for Spent LiFePO<sub>4</sub> Batteries: A Non-Invasive Strategy for Capacity Regeneration and Longevity Enhancement. [PDF]
Wang P +10 more
europepmc +1 more source
Correction: From microbiome collapse to recovery: a roadmap for microbiome-informed grassland restoration under global change. [PDF]
Qiao X +5 more
europepmc +1 more source
Integrated Analysis of Physiological and Transcriptional Mechanisms in Response to Drought Stress in <i>Scaevola taccada</i> Seedlings. [PDF]
Wang Y, Liu W, Zuo C, Luo Y, Huang M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cryptographic Information Recovery Using Key Recovery
Computers & Security, 2000A note to readers: the authors consider that all techniques for key recovery may be viewed as having a position on a broad continuum. The only way to avoid misunderstanding is to identify particular techniques by listing their specific characteristics, rather than using multiply-defined terms.
Michael Smith +2 more
openaire +1 more source
Additional Key Recovery Functions
Computers & Security, 2000This document describes additional functions that may be required by specific implementations of the key recovery model. This document should not be read in isolation, but must be read in conjunction with the Key Recovery Functional Model document.
Stephen M. Matyas, Nevenko Zunic
openaire +1 more source
ISAKMP Key Recovery Extensions
Computers & Security, 2000This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP).
David Balenson, Tom Markham
openaire +1 more source
Computers & Security, 2000
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy +2 more
openaire +1 more source
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy +2 more
openaire +1 more source
Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 2002
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire +1 more source
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire +1 more source

