Crypt

Results: 686



#Item
31Computer access control / Cryptography / Obfuscation / Password / Security / Crypt / Password strength / Password cracking

Password Rehearsal Memory Games 1. Michael Lutaaya

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:43
32Computer access control / Cryptography / Obfuscation / Password / Security / Challengeresponse authentication / Crypt / Microsoft Word / Draw a Secret / Password cracking

Microsoft Word - 29_Paper.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
33Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
34Kansas City metropolitan area / Geography of the United States / Mausoleum / United States / Livermore /  California / Geography of California / Crypt / Olathe /  Kansas / Tomb / Johnson County /  Kansas / Cemetery / Kansas

The Mausolea of Johnson County, Kansas By Linda K. Lewis 1 October 2007 The Mausolea of Johnson County, Kansas

Add to Reading List

Source URL: joco-ksgenweb.cottonhills.net

Language: English - Date: 2014-10-13 23:09:19
35Ebola / Economic Community of West African States / Sierra Leone / West African Ebola virus epidemic / Ebola virus disease / Ebola virus epidemic in Sierra Leone / International Mutual Aid

DEMAC & ABC EVENT Friday 8 July 2016, 18:00 – 21:30 InSpire at St Peter’s The Crypt, St Peter’s Church, Liverpool Grove, London, SE17 2HH ‘Sierra Leone’s Recovery and the Role of the Diaspora’ The ABC & DEMAC

Add to Reading List

Source URL: www.afford-uk.org

Language: English - Date: 2016-07-24 14:04:02
36Computer storage devices / Cryptographic hash functions / Error detection and correction / Data management / Search algorithms / Search engine indexing / Crypt / Content-addressable storage / Backup / Data storage device / Data / SHA-1

libchop, a library for distributed storage & data backup

Add to Reading List

Source URL: www.nongnu.org

Language: English - Date: 2010-07-25 03:57:46
37Disk encryption / Cryptographic software / Cryptography / Cross-platform software / Password / Erlang / Crypt / BitLocker / GBDE

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
38Disk encryption / Cryptographic software / Password / USB flash drive / Crypt / BitLocker / Password manager

Encryption Procedure Removable Media Encryption – User Guide (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-11-17 11:50:26
39Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
40NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
UPDATE