REASEARCH PAPER (NO PLAGARISM)
Research Report 10/100 Due date Sunday 12/3/2018 @11:59
ID |
research report |
2831596 |
Digital rights management |
2837908 |
legal and ethical issues of cryptography |
2833302 |
International legal aspects of cryptography |
2837926 |
Cryptography Quantum key distribution |
2838012 |
Financial cryptography |
2834979 |
HTTP Secure |
2817747 |
Non-repudiation methods |
2809315 |
Secret sharing methods |
2837185 |
Secure multi-party computation |
2799840 |
Cryptography formal model: Burrows–Abadi–Needham logic |
2838687 |
internatioal Cryptography law |
2841920 |
Cryptography formal model: π-calculus (or pi-calculus) |
2833609 |
Cryptography formal model: Protocol composition logic |
2843339 |
PKI |
2843885 |
SSL/TLS |
2832177 |
LEGAL ISSUES IN CRYPTOGRAPHY |
2843101 |
LEGAL AND LIABILITY ISSUES FOR USE OF CRYPTOGRAPHY |
2831653 |
International Cryptography Regulation |
2831623 |
Encryption Policy and Its International Impacts |
2842925 |
legal and ethical issues of cryptography |
2831931 |
Electronic Cash |
2815987 |
Security Token |
2841479 |
Steganography algorithms |
2842367 |
International legal aspects of cryptography |
2832759 |
Cryptography Protocols |
2802325 |
Authentication protocols |
2838693 |
Cryptography standards |
2834995 |
Hardware to Support Cryptography |
2838944 |
Common criteria (cryptography product) certification and accreditation |
2831972 |
Cryptographic product selection criteria |
|
|
|
|
|
Wireless communication |
|
Identity federations |
|
Cryptography Authentication |
|
|