Function key

Results: 1153



#Item
181Inverse trigonometric functions / Complex number / Function / Control key / Complex plane / Logarithm / Factorial / Holomorphic function / Branch point / Mathematical analysis / Mathematics / Complex analysis

PDF Document

Add to Reading List

Source URL: www.cims.nyu.edu

Language: English - Date: 2001-05-14 02:11:48
182Password / Salt / Passwd / John the Ripper / Key derivation function / Crypt / Password strength / OTPW / Cryptography / Computer security / Security

CERIAS Tech ReportErsatzPasswords Ending Password Cracking by Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah and Eugene H. Spafford Center for Education and Research Information Assurance an

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2015-02-13 11:29:28
183GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
184Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
185Time clock / Working time / Biometrics / Security / Function key / Schlage / Time / National security / Clocks / Horology / Labor

HandPunch® GT-400 Biometric time & attendance terminal Overview

Add to Reading List

Source URL: www.infotronics.com

Language: English - Date: 2014-09-08 14:45:27
186Databases / Relational database management systems / Insert / Database trigger / User-defined function / Update / Data Definition Language / Foreign key / Null / Data management / SQL / Database management systems

CONTENTS INTRODUCTION xxv

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-28 13:03:46
187Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
188Business law / Turnkey / Function key

Key/Card Agreement Contractors Key/Card Control Center • 035 Central Service Building • 2003 Millikin Road • Columbus OH 43210 • • fax

Add to Reading List

Source URL: fod.osu.edu

Language: English - Date: 2008-09-30 14:20:28
189Computer keyboard / Boolean data type / Cursor / Windows Registry / Null / Function key / Software / Computing / Insert key / Human–computer interaction

Quick3270 configuration file description (ecf) Version 4.37 – January 2013 Remarks. - Quick3270 settings can be saved to a configuration file (.ecf) or to the registry.

Add to Reading List

Source URL: www.dn-computing.com

Language: English - Date: 2015-02-04 18:49:26
190End-diastolic volume / Pressure-volume loop analysis in cardiology / Cardiac input / Cardiovascular physiology / Ventricle / Ejection fraction

SPECIALTY APPLICATIONS - CARDIAC MR MR Cardiac Function Qi Imaging’s Cardiac Function analysis application automates several key functions and calculations for functional evaluation of the left ventricle from multi-ph

Add to Reading List

Source URL: www.qiimaging.com

Language: English - Date: 2014-06-15 23:53:35
UPDATE