San Jose State University
CS 265 — Cryptography and Computer Security
108 documents • ranked by quality and engagement.
No description provided
Micropayment Schemes (Two Types)
Secure Shell (SSH) - Cryptography and Computer Security
Cryptography using Quantum Mechanics
Security in Peer-to-Peer Systems
Temporal Key Integrity Protocol (TKIP)
Hunter Security Tool
EAP (Extensible Authentication Protocol)
Certificates (Digital)
Distributed Access Control Application Akenti
VPNs (Virtual Private Networks) - CS 265
Techniques of Steganography - 7 Pages
Message Digest Algorithm MD5
Obfuscation of Java Code
Recognition of Gait
Security Blunders
Proofs of Zero Knowledge
SAP Security
Cryptography Presentation
RADIUS Protocol Introduction
XSS (Cross Site Scripting)
Collaborative Systems
VPNs (Virtual Private Networks) - 7 Pages
Cards (Smart)
Future Shaped by Simple and Complex Threats