Digital ID

Results: 917



#Item
911ID-based encryption / ID-based cryptography / Certificate-based encryption / Digital signature / Key / Diffie–Hellman key exchange / Public key infrastructure / Certificateless cryptography / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
912Capacity building / Nonprofit technology / United Nations Development Programme / Needs assessment / Personal digital assistant / Governance / Peace and conflict studies / Sociology / Development / Political science / Technology

PDF Document

Add to Reading List

Source URL: www.undp.or.id

Language: English - Date: 2007-07-18 10:16:40
913Quake / Linux games / Mobile games / Video game development / Video games with variable translation control / Machinima / Id Software / Doom / Mod / Digital media / Software / Application software

High-Performance Play: The Making of Machinima

Add to Reading List

Source URL: www.stanford.edu

Language: English - Date: 2004-09-14 13:00:56
914Quake / Linux games / Windows games / First-person shooters / Multiplayer online games / Quake III Arena / Video game bot / Deathmatch / Id Software / Software / Digital media / Application software

PDF Document

Add to Reading List

Source URL: www.kbs.twi.tudelft.nl

Language: English - Date: 2004-07-26 09:28:24
915Public-key cryptography / NTRUSign / Lamport signature / NTRU / Digital signature / Lattice-based cryptography / Merkle signature scheme / ID-based encryption / Key / Cryptography / Post-quantum cryptography / Key management

PDF Document

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2009-04-08 18:56:03
916First-person shooters / Linux games / Quake / Video games with variable translation control / Windows games / First-person shooter / Wolfenstein 3D / Doom / Id Software / Digital media / Software / Application software

PDF Document

Add to Reading List

Source URL: www.dharamjitrihal.com

Language: English - Date: 2008-08-21 23:36:54
917Spamming / Email / Public-key cryptography / Email authentication / ID-based cryptography / ID-based encryption / Digital signature / S/MIME / Phishing / Cryptography / Internet / Computing

PDF Document

Add to Reading List

Source URL: theory.lcs.mit.edu

Language: English
UPDATE