Back to Results
First PageMeta Content
Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad


Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security
Add to Reading List

Document Date: 2008-06-03 04:22:03


Open Document

File Size: 469,42 KB

Share Result on Facebook

City

Moscow / Washington / /

Company

IBM / AES / E C G T K D S A / SECRET S A / K1 / Microsoft / /

Continent

Europe / /

Country

United States / Soviet Union / /

Currency

pence / USD / /

Facility

Berkeley University / Store Rn / /

Holiday

Easter / /

IndustryTerm

2n search / communication technology / brute-force search / Internet protocols / verification protocols / Web browser / communications secrecy / secrecy systems / blockcipher algorithms / malicious software / exhaustive search / online banking / cryptographic protocols / hypothetical device / cryptographic systems / utility services / cryptographic algorithms / makes brute force search / substitution/permutation network / friend/foe systems / car keys / diplomatic communications security / search effort / recent algorithms / makes brute force key search / /

Movie

Sabotage / /

OperatingSystem

Linux / /

Organization

US government / European Central Bank / US Federal Reserve / Berkeley University / /

Person

Caesar Cipher / Ian Goldberg / Dieter Gollmann / Leslie Lamport / David Wagner / Bruce Schneier / Markus Kuhn / /

Position

Prime Minister / device driver / General / Linux /dev/random device driver / /

ProgrammingLanguage

C / /

Technology

S/MIME / century produce VLSI chips / SSL encryption / Linux / block cipher / blockcipher algorithms / Internet protocols / secret key / 25 Data Encryption / random access / digital cash / communication technology / operating system / SSL / Encryption / cryptography / PIN verification protocols / Public key / flow control / HTTP / /

URL

http /

SocialTag