Cryptography

Results: 21893



#Item
491Cryptography / E-commerce / Key management / Public key certificate / Public key infrastructure / Public-key cryptography / DV / Order / Inspection / Professional certification

Citizen’s Charter No. 15-a Name of Agencies Frontline Service Schedule of Availability of Service Who May Avail of the Service

Add to Reading List

Source URL: www.denr.gov.ph

Language: English - Date: 2016-07-07 05:12:13
492Security / Prevention / Crime prevention / National security / Computer network security / Computer security / Cryptography / Cyberwarfare / Classified information

Position Designation Questionnaire

Add to Reading List

Source URL: www2.usgs.gov

Language: English - Date: 2016-05-25 09:18:36
493Operations research / Mathematical optimization / Mathematics / Packing problems / Mathematical analysis / Academia / Cryptography / Knapsack problem / Multi-objective optimization / Pareto efficiency / Probability distribution / Pareto distribution

CS264: Beyond Worst-Case Analysis Lecture #14: Smoothed Analysis of Pareto Curves∗ Tim Roughgarden† November 5,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-29 15:44:35
494Malware / Cyberwarfare / Computer security / Ransomware / Cybercrime / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
495Cryptography / Computational complexity theory / Pseudorandomness / Analysis of algorithms / Probabilistic complexity theory / Pseudorandom function family / Randomized algorithm / Random number generation / Pseudorandom number generator / One-way function / Advantage / IP

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2003-04-15 15:57:50
496Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
497Security / Computing / Prevention / Secure communication / E-commerce / Crime prevention / Cryptography / National security / Trusteer / Itzik Kotler / Transport Layer Security / Computer security

SafeBreach Stop tomorrow’s breach. Today. In Plain Sight: The Perfect Exfiltration

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2016-05-27 09:10:01
498Cryptography / Algebra / Elliptic curve cryptography / Mathematics / Pairing-based cryptography / Elliptic curves / Elliptic curve / Tate pairing / Supersingular elliptic curve / Pairing / Curve

The S˜ao Paulo Advanced School of Cryptography — SP-ASCryptoHardware Implementation of Pairings Francisco Rodr´ıguez-Henr´ıquez CINVESTAV-IPN, Mexico City, Mexico

Add to Reading List

Source URL: delta.cs.cinvestav.mx

Language: English - Date: 2011-10-24 22:54:15
499Cryptography / Vital statistics / Identity documents / Genealogy / Public-key cryptography / Postal system / United States Postal Service / Birth certificate / Death certificate / Post-office box / Public key certificate / ZIP Code

Birth/Death Certificate Mail Order Form

Add to Reading List

Source URL: www.doh.wa.gov

Language: English - Date: 2014-11-20 15:43:15
UPDATE