Cryptography

Results: 21893



#Item
291Cryptography / Identity documents / Vital statistics / Genealogy / Public-key cryptography / Birth certificate / Public key certificate / Death certificate / Marriage certificate

CO-CDOT_logos_singlecolor_cmyk

Add to Reading List

Source URL: www.co.cheyenne.co.us

Language: English - Date: 2015-07-23 12:50:10
292Cryptography / Economy / Finance / Public-key cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Certificate of deposit / Academic degree / Ladder

Request for Career Ladder Level Re-Evaluation May 2015 Use this form to request a re-evaluation of your Nevada Registry Certificate of Achievement. Renewal with The Nevada Registry is on an annual basis. However, if you

Add to Reading List

Source URL: www.nevadaregistry.org

Language: English - Date: 2015-05-19 22:37:55
293Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: fellows.acm.org

Language: English - Date: 2015-03-30 17:41:07
294Cryptography / Public-key cryptography / Key management / Public key infrastructure / E-commerce / Public key certificate

Microsoft Word - Request for Certificate.dot

Add to Reading List

Source URL: www.ihlic.com

Language: English - Date: 2014-03-06 11:04:51
295Security / Computer network security / Cyberwarfare / Computer security / Cybercrime / Cryptography / Threat

Experimental  Challenges  in  Cyber  Security:   A  Story  of  Provenance  and  Lineage  for  Malware   Tudor  Dumitraș                  

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-08-22 18:12:38
296Cryptography / Optical illusions / Perception / Vision / Illusory motion / Enigma machine / Motion perception / Apparent motion / Clockwise

doi:j.visres

Add to Reading List

Source URL: decone.psy.unipd.it

Language: English - Date: 2012-11-27 10:55:10
297Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / Archive formats / Public key certificate / Certificate authority / Adobe AIR / Root certificate / Self-signed certificate / Deb

Packaging and Signing Adobe Extensions

Add to Reading List

Source URL: wwwimages.adobe.com

Language: English - Date: 2014-05-02 07:29:13
298Cyberwarfare / Security / Computer security / Cybercrime / National security / Computer network security / Cryptography / Cyber-security regulation / Cybersecurity CS5L CMM

Security  is  Not  a  Commodity:   The  Road  Forward  for  Cybersecurity  Research   Stefan  Savage   UC  San  Diego    

Add to Reading List

Source URL: cra.org

Language: English - Date: 2016-03-07 14:51:02
299Computing / Software / Cryptography / Pseudorandom number generators / Computing platforms / Cross-platform software / Random number generation / Cryptographic software / /dev/random / Key generation / Entropy / Java

Motivations PRNG Security Model Java SecureRandom Analysis

Add to Reading List

Source URL: www-fourier.ujf-grenoble.fr

Language: English - Date: 2014-03-31 06:15:11
300Cryptography / Computer access control / Subscriber identity module / MAC address / Hardware / Computer hardware

Team name: Member name: HARDWARE REGISTRATION FORM Please add an entry for every hardware item estimated to worth more than 50 EUR and SIM and WIFI capable Hardware. Teams can use only one

Add to Reading List

Source URL: ch24.org

Language: English - Date: 2016-06-29 02:21:20
UPDATE