Geometry.Net - the online learning center
Home  - Science - Cryptography
e99.com Bookstore
  
Images 
Newsgroups
Page 9     161-176 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9 
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Cryptography:     more books (100)
  1. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Bruce Schneier, 1996-10-18
  2. Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, et all 2010-03-15
  3. Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar, Jan Pelzl, 2009-12-10
  4. An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics) by Jeffrey Hoffstein, Jill Pipher, et all 2010-11-02
  5. Cryptography and Network Security: Principles and Practice (5th Edition) by William Stallings, 2010-01-24
  6. Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/CRC Cryptography and Network Security Series) by Jonathan Katz, Yehuda Lindell, 2007-08-31
  7. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh, 2000-08-29
  8. Cryptography Decrypted by H. X. Mel, Doris M. Baker, 2000-12-31
  9. Practical Cryptography by Niels Ferguson, Bruce Schneier, 2003-03-28
  10. Cryptography: A Very Short Introduction (Very Short Introductions) by Fred Piper, Sean Murphy, 2002-07-15
  11. Cryptography: The Science of Secret Writing by Laurence D. Smith, 1955-06-01
  12. Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) by Douglas R. Stinson, 2005-11-01
  13. Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Discrete Mathematics and Its Applications) by Alexander Stanoyevitch, 2010-08-09
  14. Foundations of Cryptography: Volume 1, Basic Tools by Oded Goldreich, 2007-01-18

161. Phaos Technology Corporation - Java Security, Identity Management, Data Security
SSL, TLS, S/MIME, digital certificate, PKI, and cryptography libraries. commercial
http://www.phaos.com/index.html

Liberty Solutions

Phaos Crypto FIPS

Phaos Liberty Alliance Offerings

Liberty Alliance Solutions: Phaos offers a wide range of Liberty-enabled solutions including a Liberty specification SDK Liberty Identity Provider and Liberty Service Provider SDKs and stand-alone Liberty-compliant solutions
Phaos Engineering Briefings: To better understand how Phaos can help you improve your trading relationships, you can speak to one of our engineers directly for a consultation. For more information, please email us at license@phaos.com or call us at (888) 99-PHAOS or +1 212 514 6515.
Phaos Liberty Web Demonstration: To better understand how Phaos can Liberty-enable your solution, click here for Phaos' online demonstration of single sign-on using the Liberty specifications. Special Offer:
Ask us about our competitive upgrades...
For companies using Baltimore software products, we're offering a competitive upgrade to Phaos software. Contact us for more details at (888) 99-PHAOS or by email at license@phaos.com

162. Cryonics And Cryptography
Cryonics, cryptography, and Maximum Likelihood Estimation. In cryptography,the person who wants to send a secret message transforms it.
http://www.merkle.com/cryo/cryptoCryo.html
Cryonics , Cryptography, and Maximum Likelihood Estimation
by Ralph C. Merkle Xerox PARC , 3333 Coyote Hill Road, Palo Alto, CA, 94304. This paper was published in the Proceedings of the First Extropy Institute Conference, held at Sunnyvale, California in 1994. Some changes have been made to this version. A more general overview of the technical feasibility of cryonics is available at http://www.merkle.com/cryo/techFeas.html
Introduction
Most people, if they think of cryonics at all, think of Woody Allen in Sleeper , Sigorney Weaver in Aliens , or Mel Gibson in Forever Young . The hero, after spending decades or centuries in the deep freeze, thaws out gradually and somewhat painfully. Rather stiff from the cold, the warmth of the new era slowly penetrates into their chilled limbs until they at last stretch and look about the world with renewed interest and vitality. Not! All in all, our hero is not going to simply thaw out and walk off. And yet the literature on freezing injury, on ischemia, and on the other damage likely caused by a cryonic suspension forced me to conclude that cryonics would almost surely work: how can this be?
Molecules and people
Fundamentally, people are made of molecules. If those molecules are arranged in the right way, the person is healthy. If the're arranged in the wrong way, the person is unhealthy or worse. While a surgeon's knife does indeed rearrange molecular structure, it does so only in the crudest fashion. The living tissue itself is what really arranges and rearranges the intricate and subtle molecular structures that underlie life and health. When the tissue is too badly damaged, when intracellular levels of ATP are too low to provide the energy the tissue needs to function, when its own internal structure is disrupted, it can no longer heal itself. Today's surgical tools, gross and imprecise at the cellular and molecular level, can no more aid in this process than a wrecking ball could be used to repair a Swiss watch.

163. LITQ
Publications, laboratory staff members, and Java applets related to quantum cryptography, quantum information, quantum teleportation, computational complexity, algorithmics, and graph theory.
http://www.iro.umontreal.ca/labs/theorique/
@import url(litqBack.css);

164. Www.clark.net/pub/cme/html/timeline.html
Elliptic curve cryptography FAQ v1.12 22nd December 1997Elliptic curve cryptography FAQ v1.12 22nd December 1997. by George Barwood. Nowwe are in a position to do some cryptography! Alice, Bob, Cathy, David
http://www.clark.net/pub/cme/html/timeline.html

165. Cryptography And Coding Theory With MAPLE Page
Some coding theory and cryptography links, most of which use Maple.
http://web.usna.navy.mil/~wdj/crypto.htm
Cryptography and coding theory with MAPLE page
Here are some coding theory and cryptography links (most of which use MAPLE):

166. Springer-Verlag - Number Theory & Combinatorics
Neal Koblitz. A textbook for a course, or selfinstruction, in cryptography with emphasis on algebraic methods.
http://www.springer-ny.com/detail.tpl?isbn=3540634460

167. Piracy.com: International Cryptography Freedom
Links to cryptography related downloads and information from around the world.
http://www.piracy.com
piracy.com Provided as a public service of Rotten and Daily Rotten INTERNATIONAL CRYPTOGRAPHY FREEDOM Last Updated 3 February 2001: Add USUC 20
jya@pipeline.com
Please mirror this page, or scavenge it to make your own. Let us know about additional sites or your page and we'll make a link. See also: Cryptome for news
Ritter's
Learning About Cryptography
Ritter's
Crypto Glossary and Dictionary of Technical Cryptography
UNITED STATES UNRESTRICTED CRYPTOGRAPHY Program URL Notes USUC 1
Cracking DES http://www.shmoo.com/~pablos/Cracking_DES/ The Shmoo Group is proud to present...
for the first time...
available legally for download in the United States...
from the jurisdiction of the 9th US Circuit Court of Appeals... USUC 2 Secure Office http://www.filesafety.com Mirror: http://come.to/SecureOffice Charles Booher's site, formerly under attack by the USG USUC 3
Secure Remote Password (SRP) distribution http://srp.stanford.edu/srp/ A cryptographically secure remote-access suite, featuring Telnet and FTP with full strength 128-bit encryption. Open Source, unrestricted downloads. Available from mirror sites worldwide. USUC 4
PGP 2.62

168. Timing Analysis Of Keystrokes And Timing Attacks On SSH
PDF format Paper describing research into applying trafficanalysis techniques to interactive SSH connections in order to infer information about the encrypted connection contents. Concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions.
http://packetstormsecurity.nl/papers/cryptography/ssh-timing.pdf

169. CryptoSys Cryptography Software Tools For Visual Basic And C/C++ Developers
CryptoSys is a commercial site which offers cryptography software tools for Visual Basic developers. Included are many symmetric algorithms (Rijndael, DES, 3DES, and Blowfish) together with various oneway hash funcitons (SHA-1 and SHA-256).
http://www.cryptosys.net/
Cryptography software tools for Visual Basic and C/C++ developers
The CryptoSys TM range of cryptographic products provide a full set of developer tools to secure your e-Commerce applications in Visual Basic and C/C++. CryptoSys API CryptoSys Blowfish CryptoSys Hash CryptoSys Encode ... Contact us Not quite cryptography, but please check out our new DBX analyzer program that allows you to read, analyse and export files from a Microsoft Outlook Express DBX file. For more details, see the DBXanalyzer page.
CryptoSys Products
CryptoSys PKI Our brand new CryptoSys PKI toolkit features RSA public key encryption, digital signatures, X.509 certificate handling, and cryptographic message syntax (CMS) objects that can be used with S/MIME. Full details on the CryptoSys PKI Toolkit page. Includes message digest computation with SHA-1/MD5/MD2, secure random numbers, and base64 conversion functions. Interfaces for Visual Basic and C/C++. Issued 25 February 2004 CryptoSys API The original CryptoSys API provides four of the major block cipher algorithms: AES, DES, Triple DES and Blowfish, two secure hash algorithms: SHA-1 and SHA-256, the HMAC message authentication algorithm, and a secure random number generator. New in Version 2: C/C++ interface, data compression functions, and a new stateless random number generator fully compatible with the latest FIPS-140-2 and ANSI X9.31/X9.17.

170. Crypto Law Survey
Gives an overview of existing laws and regulations with entries per country on import/export controls, domestic laws, developments to restrict or promote cryptography.
http://rechten.uvt.nl/koops/cryptolaw/
Bert-Jaap Koops homepage Version 22.1, January 2004
© Bert-Jaap Koops
Next update 15 January 2005.
  • Address list for crypto export licenses
  • You can subscribe to a mailing list announcing updates (body text: "SUBSCRIBE CRYPTOLAW-L")
  • There are maps summarizing the import, export, and domestic crypto controls around the world. Test your geographic knowledge!
  • For background information, see my Ph.D. thesis. The Crypto Controversy . A Key Conflict in the Information Society . How can and should governments address the law-enforcement problems of cryptography?
home related research digital signature law survey crypto and self-incrimination FAQ ... Table of Contents This is a survey of existing and proposed laws and regulations on cryptography - systems used for protecting information against unauthorized access. Governments have long restricted export of cryptography for fear that their intelligence activities are hampered by the crypto use of foreign states and scoundrels. Since the rise of crypto use over the past decades, governments increasingly worry about criminals using cryptography to thwart law enforcement. Thus, many countries are considering laws focusing on maintaining law-enforcement and national-security capabilities through regulation of cryptography. This survey gives an overview of the current state of affairs, with entries per country on import/export controls, domestic laws, developments to restrict cryptography, and developments favoring crypto use. For more

171. INRIA - Projet CODES
CODES Coding and cryptography research group. Publications and research reports.
http://www.inria.fr/Equipes/CODES-eng.html

Research teams
Cooperative Initiatives International Scientific Collaboration Researchers' News

CODES : Coding and information protection (project-team)
About the team :
Project-Team site

Activity report

Research reports and theses

Theme : Sym

Symbolic systems
INRIA Rocquencourt research unit
Project-Team Presentation
The research area addresses problems on information coding. More precisely, the main purpose is to conceive and study objects devoted to algorithmic protection of information. The tools which are used are discrete mathematics and algorithmics. Fundamental research is organized around the study of cryptographic primitives and of sophisticated error-correcting codes, as geometric codes.
Research themes
Specific actions currently are:
  • design and analysis of error-correcting codes (protecting information from noise).
  • study of algorithms providing privacy (ciphers).
  • study of algorithms providing integrity (digital signature).
These actions are strongly connected, theoretically and practically. From a theoretical point of view, they are based on coding theory and on properties of finite fields. For the practical aspects, there are new applications in cryptography for which several tools from coding theory are involved.
International and industrial relations
  • The Codes project participates in the implementation of a cryptographic package, with the Cogenit society, and the projects Algo and Ipv6.

172. Counterpane Internet Security, Inc.
View Our Webcast. Counterpane Presentation Network Events Processed Since1/1/2004. Counterpane is your single source network security partner.
http://www.counterpane.com/

Counterpane Announces Suite of Managed Security Services Designed for Small and Mid-Sized Enterprises
"Leaders of the MSPP Pack" Security Alert: W32/Kibuv.worm Getronics And Counterpane Announce Strategic Security Services Partnership ... Counterpane Presentation
Network Events Processed
Since 1/1/2004
Counterpane is your single source network security partner. Our services transcend traditional security models to ensure complete protection that permeates our clients' internal, external, and perimeter security infrastructure. Our visibility inside and across our entire client population provides us with the unique access and ability to leverage the collective, real time intelligence of security events occurring around the globe. Our Enterprise Protection is a modular suite of services that are enhanced by our core real time Managed Security Monitoring. This suite includes our Managed Vulnerability Scanning, Device Management, and Active Response services, all complemented by Counterpane's robust Security Consulting Practice. Counterpane is the recognized leader in Managed Security Services. Our managed security services guarantee protection of our clients' critical assets through a combination of the industry's most comprehensive and proven security technology, and the unmatched expertise of our security experts working around the clock and around the globe. Hundreds of global enterprises trust their information security to Counterpane.

173. WebWorks.com | Page Not Found
This page has not been found at www.webworks.com. Please click ona link above to continue, visit the search page, or send email
http://www.quadralay.com/www/Crypt/Crypt.html
Page Not Found This page has not been found at www.webworks.com. Please click on a link above to continue, visit the search page
or send e-mail to webmaster@webworks.com for assistance.
Home
Products Services Training ...
webmaster@webworks.com

All other company and product names and logos are for identification purposes only and are the property of,
and may be trademarks of, their respective owners.

174. Phil Karn, KA9Q
Phil Karn, KA9Q Karn (at) qualcomm (dot) com. My wife, Kimberly,and me in New Orleans, May 2000 Photo by Mary Jo Wilson If you
http://people.qualcomm.com/karn/

175. Joel's Page
Books Related. My latest book, GPS for Dummies will be out by the endof May 2004 Geocaching for Dummies, which I m currently finishing
http://www.eskimo.com/~joelm/
My latest book, GPS for Dummies will be out by the end of May 2004
Geocaching for Dummies, which I'm currently finishing up, should be available late summer 2004 I've finally gotten around to creating a blog devoted to GPS, sports-related technology, and
other things I find interesting (and you might find useful)
Watch for expanded GPS-related content (including reviews) on this Web page coming soon
For starters, here's a quick review of the Garmin Forerunner 201 GPS for runners
My first book - here are some reviews , a sample chapter and links that go with it
also see " The Mystery of Damien Casablanca "
Current Activities
Oregon Disaster Medical Team
Team FootZone Bend - Adventure Racing
The Complete, Unofficial TEMPEST Information Page

(not updated as much as in the past, but still active) Archived stuff Private Idaho hasn't been worked on in years, but still seems to be popular Malheur Rappel Crew is about fire rappelling for the Forest Service Joel McNamara - last updated May 7, 2004 joelm @ eskimo .com - spam filter, remove the spaces to email (my current PGP key is

176. Redirecting To Http//www.cccns.uwm.edu If Your Browser Doesn T
Redirecting to http//www.cccns.uwm.edu If your browser doesn t understandthe redirect, you may want to go to http//www.cccns.uwm.edu directly.
http://www.cs.uwm.edu/~cccns/
Redirecting to http://www.cccns.uwm.edu If your browser doesn't understand the re-direct, you may want to go to http://www.cccns.uwm.edu directly.

A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Page 9     161-176 of 176    Back | 1  | 2  | 3  | 4  | 5  | 6  | 7  | 8  | 9 

free hit counter