Function key

Results: 1153



#Item
971Human resource management / Unemployment / United Nations Economic and Social Commission for Western Asia / Social protection / Employment / Decent work / Minimum wage / Labor force / Active labour market policies / Labor economics / Economics / Sociology

“Rethinking policies toward youth unemployment: What have we learned?” Background Note 1 1. Background The Annual Ministerial Review (AMR) is a key function of the United Nations Economic and Social Council (ECOSOC)

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2012-05-24 15:05:53
972Function key / Procurement / Commerce / Requisition

Central Supply is a division of the Office of Management and Budget/Central Services Division responsible for providing offic

Add to Reading List

Source URL: www.nd.gov

Language: English - Date: 2010-08-02 13:16:22
973Public-key cryptography / Internet standards / Symmetric-key algorithm / Key Wrap / Key / Message authentication code / Transport Layer Security / Cryptographic hash function / Cryptographic key types / Cryptography / Key management / Cryptographic protocols

Cryptographic Key Management Issues & Challenges in Cloud Services

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-15 16:06:45
974Function key / Less / Find / More / Computing / Software / System software

CIVIL CASE PROCESSING SYSTEM - PUBLIC ACCESS USER MANUAL TABLE OF CONTENTS ABOUT THIS MANUAL ......................................................................................................... 3 SCOPE.............

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2007-10-24 13:56:18
975Menu / Language / Computer keyboard / Printing / Function key

TABLE OF CONTENTS SUBJECT PAGE Available Reports and Topic...............................................................1

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2014-07-22 04:08:32
976Abuse / Aggression

NOTE: The document on the following page is intended to function as a guide to ensure proper triage of key elements when considering discharge for L3 or L4 facilities. It is intended to be used in a team setting and by i

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2012-11-15 10:31:29
977Public key certificate / Revocation list / Lightweight Directory Access Protocol / SHA-1 / Object identifier / Hash function / Cryptography / Public-key cryptography / X.509

NOTE: This Technical Advisory describes a matter which may impact your product. TWIC Technical Advisory TA-2014-TWIC001-V1.0

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2014-04-16 09:41:47
978ECRYPT / Cryptographic hash function / RIPEMD / PKCS / Block cipher / Symmetric-key algorithm / Key size / Institute for Applied Information Processing and Communications / Cipher / Cryptography / Public-key cryptography / Cryptographic software

ECRYPT  IST[removed]ECRYPT European Network of Excellence in Cryptology

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2008-11-19 10:24:39
979Finite fields / Cryptographic protocols / Diffie–Hellman problem / Trapdoor function / Hellman / XTR / CDH / Diffie–Hellman key exchange / Discrete logarithm / Cryptography / Abstract algebra / Computational hardness assumptions

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-03-26 12:35:28
980Block cipher / Cryptanalysis / FEAL / Cube attack / Linear cryptanalysis / Cryptographic hash function / Stream cipher / Ciphertext / Advanced Encryption Standard / Cryptography / Differential cryptanalysis / Symmetric-key algorithm

ECRYPT II   ICT[removed]ECRYPT II European Network of Excellence in Cryptology II

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2012-12-20 12:24:34
UPDATE