Error function

Results: 718



#Item
11Cryptography / Error detection and correction / Hash function / Radio-frequency identification / Cryptographic hash function

Proceedings - NN - Analysing the Molva and Di Pietro Private RFID Authentication Scheme

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:38:30
12Linguistics / Corpus linguistics / Collocation / Co-occurrence / Lexical function / Lexicography / Lexical item / Error detection and correction / Keyword / Yarowsky algorithm

Instructions for PreparingeLEX2013 Proceedings

Add to Reading List

Source URL: eki.ee

Language: English - Date: 2013-11-01 13:48:11
13Cryptography / Cryptographic hash functions / Error detection and correction / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / SHA-2 / Hash function / SHA-1 / Block cipher / Galois/Counter Mode

LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda Computer Science Department, Carlos III Unive

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-05 11:52:34
14Cryptography / Error detection and correction / E-commerce / RSA / Digital signature forgery / Digital signature / EMV / Optimal asymmetric encryption padding / Hamming weight / Hash function / Byte

Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-10 09:46:08
15Algebra / Mathematics / Computing / Search algorithms / Data types / Vectors / Hashing / Error detection and correction / Hash function / Association list / Abstract data type / Hash table

Microsoft PowerPoint - Lect12advanced_data.ppt

Add to Reading List

Source URL: sicp.csail.mit.edu

Language: English - Date: 2005-10-17 09:39:31
16Mathematics / Formal methods / Edsger W. Dijkstra / Predicate transformer semantics / Errors and residuals / Function / Science and technology

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, Dawn Song Carnegie Mellon U

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
17Cryptography / Public-key cryptography / Records management technology / Signature / Cryptographic hash functions / Error detection and correction / Hash function / Crypt / Electronic signature / Digital signature

eSignature at EC EEMA BE BriefingPierre A. Damas European Commission DIGIT.B.1.002

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
18Religion / Bible translations into English / Translation studies / Linguistics / Theism / Error / Literal translation / Translation / New Testament / Exegesis / Holy Spirit / Spirit

A Brief (and Incomplete) Introduction to this Exegetical Translation (XT) Form and Function in Translation Form follows function, or so they say. The form and structure of the words of the New Testament are designed by t

Add to Reading List

Source URL: www.triviumpursuit.com

Language: English - Date: 2008-11-06 17:24:21
19Software engineering / Computer programming / Computing / C++ / Cross-platform software / Procedural programming languages / C / Memory management / Sizeof / C dynamic memory allocation / Foreach loop / D

April 23, 2008 Bug in SpharmonicKit 2.7, S2kit 1.0 and SOFT 2.0: Error in malloc statement A user recently brought to our attention an error which occurs in the source file cospmls.c. A malloc statement in the function

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-04-23 10:20:05
20Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
UPDATE