Results 241 to 250 of about 2,456,516 (297)
Some of the next articles are maybe not open access.

Related searches:

Cryptographic Information Recovery Using Key Recovery

Computers & Security, 2000
A note to readers: the authors consider that all techniques for key recovery may be viewed as having a position on a broad continuum. The only way to avoid misunderstanding is to identify particular techniques by listing their specific characteristics, rather than using multiply-defined terms.
Michael Smith   +2 more
openaire   +1 more source

Additional Key Recovery Functions

Computers & Security, 2000
This document describes additional functions that may be required by specific implementations of the key recovery model. This document should not be read in isolation, but must be read in conjunction with the Key Recovery Functional Model document.
Stephen M. Matyas, Nevenko Zunic
openaire   +1 more source

ISAKMP Key Recovery Extensions

Computers & Security, 2000
This document describes the proposed approach for negotiating and exchanging key recovery information within the Internet Security Association Key Management Protocol (ISAKMP).
David Balenson, Tom Markham
openaire   +1 more source

Key Recovery Functional Model

Computers & Security, 2000
This document describes a model for key recovery. The means by which plaintext may be recovered or reconstructed from recovered key(s) is not addressed in the key recovery model. The key recovery model is a generalized model that encompasses a wide variety of key recovery systems, including both key backup and encapsulated key recovery information ...
John Kennedy   +2 more
openaire   +1 more source

Cryptographic key recovery

Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, 2002
Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of excitement lies a mine of technical and commercial challenges. Without solving these challenges, secure systems will not reach their expected potential. Security can be achieved via encryption.
openaire   +1 more source

Home - About - Disclaimer - Privacy