Crypto

Results: 1625



#Item
981Cryptographic hash function / Digital signature / Hash function / XTR / Blind signature / Lamport signature / Cryptography / Public-key cryptography / RSA

CS255: Cryptography and Computer Security Winter 2003 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-10 16:54:18
982Cryptographic software / Cryptographic hash functions / Key management / Password / Keychain / Salt / KeePass / Rainbow table / PBKDF2 / Cryptography / Software / Computer security

Programming Assignment 1 Winter 2015 CS 255: Intro to Cryptography Due Feb. 13, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-02 11:42:01
983Computing / Computer architecture / Cyberwarfare / Crypto-anarchism / Virtual private network / Tunneling protocols / NeoAccel / Computer network security / Network architecture / Internet privacy

Bylaws on the Virtual Private Network service associated with the ADC computer system March 1st, 2013 (Aim) Article 1

Add to Reading List

Source URL: www.adc.nao.ac.jp

Language: English - Date: 2013-03-21 22:18:32
984Network architecture / Computer network security / Internet / Crypto-anarchism / Internet privacy / Virtual private network / Layer 2 Tunneling Protocol / IPsec / Computing / Internet protocols / Tunneling protocols

et he Datas WatchGuard® XTM 5 Series

Add to Reading List

Source URL: watchguard.com

Language: English - Date: 2015-01-12 12:37:32
985Secure voice / Public-key cryptography / Crypto phone / SGSM / Cryptography / Secure communication / Security

Communication & Network Security DigiSAFE PhoneCrypt Secure Voice Conversation

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:05:39
986Machine learning / ROS / Frederick Terman / Technology / Robotics / Science / Andrew Ng

David J. Wu Email: [removed] Web: http://cs.stanford.edu/~dwu4 Education

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-06-20 00:47:58
987Anonymity / Privacy / Science / Census / Degree of anonymity / Information privacy / Record linkage / Personally identifiable information / Ethics / Statistics / Internet privacy

Revisiting the Uniqueness of Simple Demographics in the US Population Philippe Golle Palo Alto Research Center [removed]

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-08-24 19:48:02
988Market research / Online chat / Computing / Data collection / Marketing / Internet privacy / Secure messaging / Text messaging / Instant messaging / Research methods / Computer-mediated communication / Science

Pre-Proceedings Version. This paper will appear at Financial Crypto[removed]Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages Franziska Roesner1 , Brian T. Gill2 , and Tadayoshi Kohno1

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2014-02-05 17:58:27
989Cryptographic software / Science / Mathematical sciences / Knowledge / Cryptography / Cipher / International Cryptology Conference

1 Cryptography in Practice • Crypto History • Crypto Technology

Add to Reading List

Source URL: web.interhack.com

Language: English - Date: 2009-04-12 15:00:24
990Network architecture / Crypto-anarchism / Virtual private network / Cisco Systems / TUN/TAP / Electronics / Electronic engineering / Computer network security / Computing / Internet privacy

\ UNSW VPN on Android Using the AnyConnect App To connect to the UNSW VPN from your Android device, you need to download the

Add to Reading List

Source URL: www.it.unsw.edu.au

Language: English - Date: 2014-02-04 18:11:22
UPDATE