Cryptography

Results: 21893



#Item
281Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: financial-ombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
282Software / Tetris / Gaming / Digital media / Random number generation / Steganography / Public-key cryptography / Puzzle video game / Easter egg / Random sequence / Transmission Control Protocol

CrossMark_Color_Stacked_p

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2014-08-15 02:06:04
283Cryptography / Cache / Computer memory / Advanced Encryption Standard / Side-channel attack / Data Encryption Standard / Cache memory / Lookup table / Cryptanalysis / Tiny Encryption Algorithm / Block cipher / CPU cache

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
284Security / Prevention / Economy / Crime prevention / Cryptography / Information governance / National security / Educause / Higher education in the United States / Chief information security officer / Information security / Computer security

Technology in Higher Education: Defining Information Security Leadership

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-03-21 11:17:12
285Cryptography / Politics / Voting / Electronic voting / Electoral systems / Financial cryptography / Elections / Scantegrity / Punchscan / David Chaum / E2E / Voting system

Democracy Enhancing Technologies: Toward deployable and incoercible E2E elections by Jeremy Clark

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:06:41
286Security / Cyberwarfare / Computer network security / Computer security / National security / Cybercrime / Cryptography / University of California / Merced /  California / Threat

Wednesday,  October  2 8,  2 015  at  1 2:37:42  PM  Pacific  Daylight  Time Subject: Mandatory  Cyber  Security  Awareness  Training  by  Jan.  31,  2016 Date: Friday

Add to Reading List

Source URL: it.ucmerced.edu

Language: English - Date: 2015-12-01 12:48:01
287Cryptography / Security / Computer access control / Civil law common law) / Sierre / Authentication / Electronic signature

An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2010-04-14 10:56:00
288Cryptography / Economy / Types of insurance / Insurance / Health insurance / Public key certificate

Microsoft Word - Summer Camp Medical Info Form.doc

Add to Reading List

Source URL: sportsmedia.okstate.edu

Language: English - Date: 2016-02-09 14:58:39
289Prevention / Security / Safety / Computer security / Crime prevention / Cryptography / Data security / Information security / National security / Internet privacy / Privacy

Student Affairs Data Block Access Policy Last amendedOverview /Purpose Data Stewards for The University of Georgia have entrusted the Department of Student Affairs Assessment and Staff Development (ASD) to

Add to Reading List

Source URL: asd.studentaffairs.uga.edu

Language: English - Date: 2016-06-21 13:25:33
290Mathematics / Mathematical analysis / Number theory / Conjectures / Analytic number theory / Modular forms / Riemann surfaces / Millennium Prize Problems / Riemann hypothesis / Elliptic curve / Langlands program / L-function

1. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

Add to Reading List

Source URL: www.williamstein.org

Language: English - Date: 2009-02-03 20:12:03
UPDATE