Semantic Scholar uses AI to extract papers important to this topic.
Information security has been a growing concern over the past few years. During the last few decades, the importance of security… Expand Cryptographic algorithms are widely used inside software for data security and integrity. The search of cryptographic data… Expand The definition and functions of typical crypto security architectures are illustrated systematically.The features of typical… Expand Security API analysis typically only considers a subset of an API's functions, with results bounded by the number of function… Expand PKCS11 is a set of cryptography device standards that is most broadly applied in the system of PKI. The conception of session in… Expand Summary Various security APIs such as IETF GCS-API and GSS-API, RSA Cryptoki, Microsoft CryptoAPI, and Intel CDSA are being used… Expand Public Key Cryptography Standards (PKCS) #11 has gained wide acceptance within the cryptographic security device community and… Expand Abstract : This final report for this project focuses on: Design and implementation of the Secure Group message ordering and… Expand Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other… Expand Until recently, the integration of cryptographic functionality into application software has required that developers tightly… Expand