Crypt

Results: 686



#Item
121Information technology management / Cryptographic protocols / Cryptographic hash functions / EDIFACT / X.509 / Crypt / Public key certificate / SHA-2 / Checksum / Cryptography / Electronic commerce / Public-key cryptography

SCTS-SC Appendix C Codelists Version

Add to Reading List

Source URL: www.tullverket.se

Language: English - Date: 2013-06-12 06:23:19
122Top Chef / Menu / Written communication / Sauce

The Crypt in Ely Place, off Holborn Circus, has been described as one of London’s “Most Magical” Party Venues. In an atmosphere redolent of times gone by, the Crypt provides a unique combination of truly historic a

Add to Reading List

Source URL: www.bleedingheart.co.uk

Language: English - Date: 2015-04-01 05:27:36
123Cryptanalysis / Crypt / Vigenère cipher / Caesar cipher / Cryptography / Cipher / Enigma machine

Permutation Groups and the Solution of German Enigma Cipher Jiˇr´ı Tuma ˚

Add to Reading List

Source URL: www.karlin.mff.cuni.cz

Language: English - Date: 2005-03-16 09:19:23
124Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-12-13 12:04:32
125Colon / Waterborne diseases / Laxatives / Melanosis coli / Rectum / Aberrant crypt foci / Diverticulosis / Polyp / Colorectal cancer / Medicine / Gastroenterology / Health

Vol. 11, 753–757, AugustCancer Epidemiology, Biomarkers & Prevention Constipation, Anthranoid Laxatives, Melanosis Coli, and Colon Cancer: A Risk Assessment Using Aberrant Crypt Foci

Add to Reading List

Source URL: cebp.aacrjournals.org

Language: English
126News media / Education / Plagiarism / The New York Times / Journalism

TALES FROM THE EDITORS’ CRYPT: DEALING WITH TRUE, UNCERTAIN, AND FALSE ACCUSATIONS OF PLAGIARISM

Add to Reading List

Source URL: cob.jmu.edu

Language: English - Date: 2010-12-20 16:31:06
127Crypt / System software / Cryptography / Cryptographic software / Password manager / Password strength / Password / Computer security / Security

Protecting Beneficiary Personal Identifiable Information (PII) Encrypting a Word file (MSWordIn an open document, click the ‘File’ tab

Add to Reading List

Source URL: yourtickettowork.com

Language: English - Date: 2015-01-07 10:36:11
128Arab world / Egyptology / Egyptian mythology / Giza Governorate / Memphis /  Egypt / Cartouche / Paser / The Crypt / High Priest of Ptah / Ancient Egypt / Africa / Nineteenth dynasty of Egypt

Egypt III: The Fate of Ramses Solutions Pi-Ramses: The Investigation Initial Clues You are Maya, a young magician in the service of the Pharaoh. The game starts on the Pi-Ramses construction site, which is troubled by st

Add to Reading List

Source URL: www.microids.com

Language: English - Date: 2014-03-19 09:55:25
129Password / Salt / Challenge-response authentication / Security token / Random password generator / Passwd / Passphrase / One-time password / Crypt / Security / Computer security / Cryptography

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
130Crypt / Feistel cipher / DEAL / ICE / Block cipher / Bcrypt / Key schedule / Cryptography / Blowfish / Data Encryption Standard

ABHINAV NATIONAL MONTHLY REFEREED JOURNAL OF REASEARCH IN SCIENCE & TECHNOLOGY www.abhinavjournal.com A RELIABLE APPROACH TOWARDS SECURE

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2014-01-30 00:14:22
UPDATE