Cryptographic software

Results: 2705



#Item
201Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
202Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
203Cryptography / Cryptographic software / Password manager / Password strength / Security / Computer security / Password

Microsoft Word - MainFrame Password Reset Controls.doc

Add to Reading List

Source URL: webgui.phila.k12.pa.us

Language: English - Date: 2010-11-19 09:48:48
204Password / Cryptographic software / Portable Document Format / Crypt / Password strength / Password cracking / Security / Computer security / Computing

Keeping Track of Your Passwords By Paul Kiesel of Kiesel + Larson Passwords. Our lives are flooded with passwords. One of the banes of our existence in 2013 is the need to remember — if you are following the rules —

Add to Reading List

Source URL: www.kbla.com

Language: English - Date: 2014-07-09 20:41:56
205Steganography / Electronics / Digital audio / Audio engineering / Cryptographic software / Steganalysis / Pulse-code modulation / Data compression / Speech coding / Cryptography / Espionage / Audio codecs

An improved adaptive gain equalizer for noise reduction with low speech distortion

Add to Reading List

Source URL: asmp.eurasipjournals.com

Language: English
206BoKS / Directory services / Cryptographic software / Computer network security / Internet protocols / Internet standards / System software / Software / Computing

SPECIFICATION PROFILE BOKS SERVERCONTROL Fox Technologies, Inc. | www.foxt.com | |

Add to Reading List

Source URL: www.foxt.com

Language: English - Date: 2015-05-01 09:55:49
207Key management / Keychain / Software / Key / Disk encryption / FileVault / KeePass / Cryptography / Mac OS X / Cryptographic software

Keychain Analysis with Mac OS X Memory Forensics Kyeongsik Lee1, Hyungjoon Koo2 Defense Cyber Warfare Technology Center, Agency for Defense Development, Sonpa P.O Box 132, Seoul, Republic of Korea Center for Information

Add to Reading List

Source URL: forensic.n0fate.com

Language: English - Date: 2013-11-29 01:40:12
208Computer architecture / Ubuntu / Cryptographic software / KGPG / Cypherpunk anonymous remailer / Cryptography / Software / Public-key cryptography

How to encrypt your form before sending it to us for processing (Ubuntu version) Note - All strings with this formatting are to be entered in a terminal window. Step 1 – Install GPG Download and install gpg if it is no

Add to Reading List

Source URL: cgi2013.welfenlab.de

Language: English - Date: 2014-08-14 09:32:51
209

Constructive Cryptography and Security Proofs Ueli Maurer ETH Zurich Abstract. Constructive cryptography, an alternative paradigm for designing cryptographic protocols and proving their security, is reviewed in this talk

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2014-07-17 09:25:50
    210KeePass / Password fatigue / LastPass Password Manager / Software / Cryptographic software / Portable software

    Software Requirements Specification KeePass 1.10

    Add to Reading List

    Source URL: www.keepass.info

    Language: English - Date: 2008-02-18 13:26:16
    UPDATE