Crypt

Results: 686



#Item
161Medway / Norman architecture / Rochester Cathedral / Textus Roffensis / England / Kent / Counties of England / English Gothic architecture

Hidden Treasures: Fresh Expressions The ‘Hidden Treasures: Fresh Expressions’ project focuses on the Crypt, the Library, and the ‘hidden collections’ in the Cathedral’s ownership. At the very heart of the proj

Add to Reading List

Source URL: www.rochestercathedral.org

Language: English - Date: 2014-01-24 08:38:41
162Cyberwarfare / Crypt / Cryptography / OTPW / Password strength / Security / Computer security / Password

Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Richard Shay, and Lorrie Faith Cranor, Carnegie Mellon University; Cormac Herley and Stuart Schechter, Microsoft Research https://www.

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-05-09 05:51:53
163Software / Notepad / Crypt / System software / Special purpose file systems / Encrypting File System / Cipher / Microsoft Windows / Cryptographic software / Disk encryption

PDF Document

Add to Reading List

Source URL: bitcrypt.moshe-szweizer.com

Language: English - Date: 2011-10-02 15:46:24
164Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
165Key management / Password / Cryptographic software / Salt / Phishing / Key stretching / SiteKey / Crypt / Key derivation function / Cryptography / Security / Computer security

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-30 18:17:59
166Computing / Public-key cryptography / Internet / Security / Internet standards / Transport Layer Security / Buffer overflow / HTTP Secure / Transmission Control Protocol / Cryptographic protocols / Secure communication / Electronic commerce

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting Michael Valkering Asia Slowinska

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2008-10-21 09:38:52
167Cyberwarfare / Rainbow table / Password / SHA-2 / Crypt / Password strength / LM hash / Cryptography / Cryptographic hash functions / Computer security

CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: Authentication

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
168Password / Cryptographic software / Cryptography / Crypt / Password policy / KeePass / Software / Security / Computer security

Password Protection APPENDIX B PASSWORD PROTECTION The payroll system provides password protection as a standard feature. If you do not wish to implement a password, you may change one or both passwords to blanks. This

Add to Reading List

Source URL: www.datasmithpayroll.com

Language: English - Date: 2008-09-16 20:41:59
169Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
170Security / Authentication server / Cryptography / Cyberwarfare / Cognitive password / Password manager / Password / Computer security / Crypt

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon () Institute for Software Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-11-15 15:54:59
UPDATE