Function key

Results: 1153



#Item
271Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
272Automated theorem proving / Concolic testing / Symbolic execution / Reliability engineering / KeY / Code injection / Function / Mathematics / Formal methods / Systems engineering

Reliability Digest, NovemberExploit Generation from Software Failures Shih-Kun Huang Information Technology Service Center National Chiao Tung University

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:02:54
273Computing / Alt-Tab / Computer keyboard / Clipboard / Function key / Event / Context menu / Exposé / Table of keyboard shortcuts / User interface techniques / Software / System software

Keyboard Maestro 1 Documentation:07 Installation To install Keyboard Maestro, simply copy it to you Mac’s application folder (or really, anywhere you like). When you

Add to Reading List

Source URL: www.keyboardmaestro.com

Language: English - Date: 2011-06-28 03:28:42
274Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
275Screenshot / Function key / Text box / Electronics / Computing / Human–computer interaction / Computer keyboard

ScreenRecord 2 User’s Guide Table of Contents Introduction

Add to Reading List

Source URL: www.miensoftware.com

Language: English - Date: 2009-04-20 11:24:11
276Replay attack / Public-key cryptography / Kerberos / Payment systems / Cryptography / Cryptographic hash function / Hashing

A Peer-to-Peer Software Metering System John Kelsey Bruce Schneier {kelsey,schneier}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
277Computing / Function key / Fn key / Apple Keyboard / Windows key / Keycap / FrogPad / IBM PC keyboard / Computer keyboards / Apple Inc. / Computer hardware

Thank you for purchasing the CM Storm Quick Fire TK! A rugged gaming keyboard using the highest grade gold plated mechanical switches (CHERRY MX) rated for over 50 million keystrokes. Using Your CM Storm Quick Fire TK Ke

Add to Reading List

Source URL: pdfs.icecat.biz

Language: English - Date: 2013-06-17 10:07:34
278Model checking / Thread / Monotonic function / Abstraction / Mathematical analysis / Concurrent computing / Computing

Monotonicity in SharedMemory Program Verification Alexander Kaiser Predicate abstraction is a key enabling technology for applying model checkers to programs written in mainstream languages. It

Add to Reading List

Source URL: www.cprover.org

Language: English - Date: 2014-06-22 11:48:59
279Digital signature / Key management / Public-key cryptography / Hash function / Civil law / Notary / Cryptography

Digital Notarization Services Digital Notarization Authority Co., Ltd. TELFAX

Add to Reading List

Source URL: www.jnotary.com

Language: English - Date: 2013-04-05 00:26:47
280System software / Computer keyboards / Keyboard layout / X Window System core protocol / Control key / Caps lock / Function key / X Window System / Shift key / Software / X keyboard extension / Computing

How to further enhance XKB configuration Kamil Toman, Ivan U. Pascal 25 November 2002 Abstract This guide is aimed to relieve one’s labour to create a new (internationalized) keyboard layout. Unlike other documents thi

Add to Reading List

Source URL: www.xfree86.org

Language: English - Date: 2004-06-04 17:45:40
UPDATE