Encryption Technique
Confidentiality in a Digital World
Data encryption, Description, DES
A Brief* History of Computers *I'm leaving out a lot, believe me...
1 Types and Effects for Asymmetric Cryptographic Protocols Andy Gordon, Microsoft Research Joint work with Alan Jeffrey, DePaul University Imperial College,
Towards Digital Rights Protection in BitTorrent-like P2P Systems Xinwen Zhang Samsung Information Systems America Dongyu Liu and Songqing Chen George Mason.
Efficient Fingerprinting to Protect Digital Content Josh Benaloh Gideon Yuval Microsoft Research FingerMark Andrew Rosen Microsoft Studios.
Efficient Secure Query Evaluation over Encrypted XML Databases Wendy Hui Wang Laks V.S. Lakshmanan University of British Columbia, Canada.
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Social Networking with Frientegrity Ariel J. Feldman Usenix Security.
Tuomas Aura T-110.4206 Information security technology Encrypting stored data Aalto University, autumn 2013.
1 CSCD434/539 Winter 2013 Lecture 11 Cryptography - Basics.
PCI-DSS Compliance Using the Hitachi ID Management Suite