Crypt

Results: 686



#Item
21Music / Bagpipes / Psaltery / Musical instrument / Rebec / French bagpipes / Rotta / Sound

The Parliament of AngelsThe Parliament of Angels was inspired by a series of fifteenth century frescos in the crypt of Bayeux Cathedral depicting ‘Musical Angels’, each of whom is to be seen playing a differe

Add to Reading List

Source URL: www.choroi.net

Language: English - Date: 2013-08-04 06:11:39
22Cryptography / Passphrase / Obfuscation / Computer security / Crypt

Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Peter Chapman

Add to Reading List

Source URL: jburket.com

Language: English - Date: 2015-08-11 16:10:08
23Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Password synchronization / Password policy

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
24Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
25Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
26Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Security hacker / Password strength / Password policy

MISSION: To broaden the knowledge and promote values necessary for Maine’s local and county government Administrators to better serve their communities. A publication of the Maine Town, City

Add to Reading List

Source URL: www.mtcma.org

Language: English - Date: 2015-07-02 11:09:14
27Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
28Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-01 10:05:10
29Death customs / Culture / Cemetery / Ritual / Funeral / Cremation / Burial / Crypt

Lake View Cemetery Assoc., Inc. 1554 – 15th Ave East Seattle WA Fax: Established in 1872

Add to Reading List

Source URL: www.lakeviewcemeteryassociation.com

Language: English - Date: 2008-06-13 19:09:14
30Cryptography / Computer access control / Computer security / Password / Security / Disk encryption / Login / Crypt / Password manager / SAP Logon Ticket

Drive Encryption Procedure Drive Encryption End User Guide (Revision Date: Table of Contents Introduction ......................................................................................................

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-05-16 15:09:57
UPDATE