Secret Service

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Secret Keys with Blind Computation Service

More and more secure symmetric key encryption algorithms with long keys are being developed and used. But, the threat is still near to us. All the attackers have to do is guessing the password of the user to make a brute force attack on the encrypted data, not the secret key. In this paper, we propose a blind computation service which can be used as a part of an encryption and decryption proced...

متن کامل

Secure Negotiation Approach for Share-Secret-Key of Kerberos Service

The generation and distribution of the shared secret-key in Kerberos protocol are a security infrastructure. In order to enhance the security of distributed applications based on Kerberos protocol, a scheme of the shared secret-key negotiation was put forward. The shared secret-key could be generated and distributed by the Diffie-Hellman algorithm. Negotiation parameters of communicating partie...

متن کامل

Custos: Increasing Security with Secret Storage as a Service

In the age of cloud computing, securely storing, tracking, and controlling access to digital “secrets” (e.g. private cryptographic keys, hashed passwords, etc) is a major challenge for developers, administrators, and end-users alike. Yet, the ability to securely store such secrets is critical to the security of the web-connected applications on which we rely. We believe many of the traditional ...

متن کامل

Secret Sharing

This document provides the basic concept of Secret Sharing technique in practice. Main overview of some current secret sharing schemes are discussed according to the papers, provided during the course. Future scope and possibilities of secret sharing schemes are also introduced.

متن کامل

Threats to Secret Service protectees: guidelines on the mental health services provider's duty to report.

This article presents a set of proposed guidelines for mental health care providers faced with the not uncommon problem of having a patient under treatment who makes statements that can be interpreted as threatening the life of the President of the United States or another protectee of the Secret Service. What is the provider's duty in this situation? When should such a "threat" be reported? Wh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature

سال: 1991

ISSN: 0028-0836,1476-4687

DOI: 10.1038/351340c0