Function key

Results: 1153



#Item
331Control key / Keycap / Computing / Apple Keyboard / Function key / FrogPad / Computer keyboards / Apple Inc. / Computer hardware

Microsoft Word - KEYCAPS.rtf

Add to Reading List

Source URL: www.elfring.com

Language: English - Date: 2010-04-16 14:51:38
332Predicate transformer semantics / Program logic / KeY / IP / Function / Algorithm / NP / Symbolic execution / Communications protocol / Theoretical computer science / Mathematics / Applied mathematics

Replayer: Automatic Protocol Replay by Binary Analysis James Newsome, David Brumley, Jason Franklin, Dawn Song∗ Carnegie Mellon University Pittsburgh, PA, USA {jnewsome,

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
333Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www2007.org

Language: English - Date: 2007-04-04 20:19:55
334Analog circuits / Power supply / Voltage regulator / Linear regulator / Escape sequence / 78xx / RS-232 / Function key / Integrated circuits / Electronics / Electronic engineering / Electromagnetism

Hand Held Operator Interface Technical User Reference Manual Two Technologies, Inc. 419 Sargon Way Horsham,. PA 19044

Add to Reading List

Source URL: www.2t.com

Language: English - Date: 2014-12-10 06:57:07
335Software testing / Predicate transformer semantics / Program logic / Fuzz testing / X Window System / Function / KeY / Errors and residuals in statistics / Network Time Protocol / Statistics / Software / Mathematics

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song Carnegie Mell

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
336Deniable authentication / Off-the-Record Messaging / Diffie–Hellman key exchange / Cryptographic hash function / Alice and Bob / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Multi-party Off-the-Record Messaging Ian Goldberg ˘ Berkant Ustaoglu

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-08-01 14:09:59
337Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
338Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
339Cryptographic protocols / Diffie–Hellman key exchange / Finite fields / RSA / Euclidean algorithm / Naor-Reingold Pseudorandom Function / Cryptography / Mathematics / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2002 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-01-05 17:05:04
340RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
UPDATE