Function key

Results: 1153



#Item
571Electronic commerce / RSA / Digital signature / Full Domain Hash / Hash function / XTR / Oracle machine / Random oracle / Prime number / Cryptography / Public-key cryptography / Cryptographic hash functions

Security Proof for Partial-Domain Hash Signature Schemes Jean-S´ ebastien Coron Gemplus Card International

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
572Key management / Access control / Key / Function key / Electronic key management / Locksmithing / Security engineering / Security

from the field a morse watchmans case study Vol. 1, No. 19 July[removed]Casino’s Tight Key Control Increases Security

Add to Reading List

Source URL: www.morsewatchmans.com

Language: English - Date: 2013-07-18 09:33:22
573Typewriters / Input/output / Function key / Technology / Digital audio players / Computing / Samsung SCH-U940 / LG Dare / Smartphones / Computer keyboards / QWERTY

USER GUIDE LG505C USER GUIDE

Add to Reading List

Source URL: www.cellphones.ca

Language: English - Date: 2012-05-24 20:51:13
574User interface techniques / Mac OS / Option key / Shift key / Text box / Control key / Function key / Finder / Computer keyboard / Software / System software / Computing

Mac OS X keyboard shortcuts Last Modified: June 25, 2010 Article: HT1343 Old Article: 75459

Add to Reading List

Source URL: macfortheblind.com

Language: English - Date: 2011-03-01 17:36:11
575Computing / Refreshable Braille display / Computer keyboard / Bluetooth / Braille / Function key / Screen reader / IPhone / Menu / Technology / Assistive technology / Accessibility

DOCX Document

Add to Reading List

Source URL: www.baumusa.com

Language: English - Date: 2015-02-06 11:43:50
576European Central Bank / European Union / Auditing / Internal control / ROPOS

PRUDENTIAL APPROVAL PROCEDURE OF KEY FUNCTION HOLDERS IN CREDIT INSTITUTIONS AND INVESTMENT FIRMS VERSION APPLICABLE AS FROM[removed]TO DIRECTORS, MEMBERS OF THE AUTHORISED MANAGEMENT AND HEADS OF

Add to Reading List

Source URL: www.cssf.lu

Language: English - Date: 2015-02-11 08:44:30
577Disk encryption / Security and safety features new to Windows Vista / Cryptography / Key derivation function / Key management

Microsoft Word - PP_Encrypted_storage_device_MSB_2012[removed]docx

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2012-08-14 06:41:14
578Locksmithing / Key / Function key

Issuance and Control of Campus Keys Original Implementation: Unpublished Last Revision: January 29, 2013 The security of the university is the responsibility of several departments on campus. First, the University Police

Add to Reading List

Source URL: www.sfasu.edu

Language: English - Date: 2015-01-30 10:30:05
579Randomness / Key management / Pseudorandomness / Randomness extractor / Key derivation function / Extractor / Random number generation / Cryptographic hash function / Key / Cryptography / Applied mathematics / Theoretical computer science

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
580Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2011-10-24 10:09:10
UPDATE