Function key

Results: 1153



#Item
141

Key Issues to Consider on the Policy Function of IPBES Work Program BY RODGER MPANDE JULY 2013 NAIROBI, KENYA IPBES AFRICA REGIONAL CONSULTATION

Add to Reading List

Source URL: ipbes.net

- Date: 2014-07-21 19:08:03
    142

    DAC-200ts USE IR Remote Codes All codes - to Philips RC-5 standard Key Printing Function

    Add to Reading List

    Source URL: www.caryaudio.com

    Language: Somali - Date: 2015-03-23 12:26:28
      143

      Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 Haina Zhang1 and Xiaoyun Wang2, 1 Key Laboratory of Cryptologic Technology and Information Security,

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2008-03-05 04:31:31
        144Control key

        City of Chicago This Report may be searched using the "Ctrl-F" function. Board of Ethics List of Registered Lobbyists Refreshed on:

        Add to Reading List

        Source URL: www.cityofchicago.org

        Language: English - Date: 2015-06-18 23:22:44
          145Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

          draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

          Add to Reading List

          Source URL: tools.ietf.org

          Language: English - Date: 2015-04-08 10:22:54
          146Binary operations / Finite fields / Computational hardness assumptions / Group theory / Trapdoor function / Public-key cryptography / One-way function / Exponentiation / Discrete logarithm / Cryptography / Abstract algebra / Mathematics

          An Attack Against Fixed Value Discrete Logarithm Representations Gergely Alp´ ar1,2⋆ , Jaap-Henk Hoepman1,2 , and Wouter Lueks1,2⋆⋆ 1

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2013-02-28 05:16:42
          147Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

          SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

          Add to Reading List

          Source URL: securitydriven.net

          Language: English - Date: 2015-04-04 22:36:18
          148Password / Key management / Crypt / John the Ripper / Key derivation function / Brute-force attack / Passwd / Botnet / OTPW / Cryptography / Computer security / Security

          Password Exhaustion: Predicting the End of Password Usefulness Luke St.Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger lstclair, johansen, enck, pirretti, traynor, mc

          Add to Reading List

          Source URL: nsrc.cse.psu.edu

          Language: English - Date: 2015-04-16 15:07:31
          149Software / Control characters / Bulletin board systems / Computer terminal / Unix / Escape sequence / ANSI escape code / ASCII / Function key / Computing / User interfaces / Human–computer interaction

          dt VT520/VT525 Video Terminal Programmer Information Order Number: EK-VT520-RM. A01

          Add to Reading List

          Source URL: www.vt100.net

          Language: English - Date: 2003-02-12 02:40:28
          150Internet / Cryptographic protocols / Public-key cryptography / Internet standards / HTTP / Network Time Protocol / Cryptographic hash function / HTTP cookie / X.509 / Cryptography / Computing / Internet protocols

          Microsoft PowerPoint - secproto.ppt

          Add to Reading List

          Source URL: www.eecis.udel.edu

          Language: English - Date: 2005-10-31 14:46:23
          UPDATE