CS-Cipher

Results: 180



#Item
81Classical cipher / Wave equation / Mathematical analysis / Calculus / Computer programming

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
82Classical cipher / Wave equation / Mathematical analysis / Calculus / Computer programming

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
83Mathematical analysis / Classical cipher / Tanzanian conservation organisations

Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems RICHARD D. SCHLICHTING University of Arizona and

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 11:29:58
84Classical cipher / Index of agriculture articles / Computer programming / Computing / Linguistics

S C H E D U L I N G IN C O N C U R R E N T P A S C A L * F. B. S c h n e i d e r A. J. B e r n s t e i n D e p a r t m e n t of C o m p u t e r S c i e n c e S.U.N.Y. at Stony Brook Stony Brook, New York, 11794

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 13:57:16
85Classical cipher / Four-square cipher / Computer programming / Computing / Software engineering

Chapter 9 Issues and Tools for P r o t o c o l Specification

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 14:08:18
86Cryptographic protocols / Electronic commerce / ID-based encryption / Transport Layer Security / Certificate authority / Cipher / Key / Public key certificate / Certificate server / Cryptography / Public-key cryptography / Key management

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34
87Classical cipher / Four-square cipher / Computer programming / Linguistics / Computing

Practical Experiments with Regular Approximation of Context-Free Languages Mark-Jan Nederhof" German Research Center for Artificial Intelligence

Add to Reading List

Source URL: www.cs.mun.ca

Language: English - Date: 2006-03-22 13:07:00
88Classical cipher / Wave equation / Mathematical analysis / Calculus / Computer programming

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
89Cipher / Block cipher / Stream cipher / Cryptanalysis / RSA / Key / Digital signature / Index of cryptography articles / Book:Cryptography / Cryptography / Public-key cryptography / Key management

The Laws of Cryptography with Java Code by Neal R. Wagner Copyright c 2003 by Neal R. Wagner. All rights reserved.

Add to Reading List

Source URL: www.cs.utsa.edu

Language: English - Date: 2004-08-20 15:40:56
90Just another Perl hacker / Perl / Classical cipher

 , @U? J ?EF9$9 7

Add to Reading List

Source URL: www.cs.engr.uky.edu

Language: English - Date: 1998-07-03 14:30:19
UPDATE