×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [encrypted value]
TD Connections
36 views
Efficient Secure Query Evaluation over Encrypted XML Databases Wendy Hui Wang Laks V.S. Lakshmanan University of British Columbia, Canada
225 views
Windows Password Handling and Security Faults Nate Prosser Lenny Calabrese Travis Stitt
214 views
padding oracle attack
8.599 views
1 Security in Wireless Protocols Bluetooth, 802.11, ZigBee
221 views
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman
226 views
1 Detecting Logic Vulnerabilities in E- Commerce Applications Presenter: Liu Yin Slides Adapted from Fangqi Sun Computer Science Department College of
218 views
Security Issues in Grid Computing Presented by: Nisarg Gandhi Aritra Mukherjee Anirudh Sethi
216 views
Authentication Building Secure Protocols. Topics The Authentication Problem Simple Device Authentication Attack and Countermeasures Cryptographic Hash
240 views
Authentication
46 views