Hashing

Results: 1317



#Item
781Cryptographic software / Internet protocols / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Cryptography standards / Hashing

Microsoft Word - 2c - Globo Server FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:21:10
782Disk encryption / HMAC / Hashing / FIPS 140-2 / Authentication / Hardware-based full disk encryption / FIPS 140 / Key / Cryptography / Cryptography standards / Message authentication codes

FIPS 140‐2 Security Policy for: Toshiba TCG Enterprise SSC Self-Encrypting Solid State Drive (PX model) TOSHIBA CORPORATION Rev 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-08 09:43:36
783Ethics / Thought / Plagiarism / Plagiarism detection / Education

Hashing and Merging Heuristics for Text Reuse Detection Notebook for PAN at CLEF-2014 Faisal Alvi1 , Mark Stevenson2 , Paul Clough2 1

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2014-07-25 05:14:36
784Internet protocols / Secure communication / Cryptographic protocols / Hashing / Transport Layer Security / Cipher suite / HMAC / Advanced Encryption Standard / FIPS 140-2 / Cryptography / Computing / Cryptographic software

Microsoft Word - 400e - Accellion SW Security Policy_Acc2 redlined -HL2-accepted.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-17 14:04:31
785Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
786Computing / Library science / Digital libraries / Preservation / Hashing / Digital preservation / Checksum / BagIt / Hash list / Error detection and correction / Archival science / Cryptographic hash functions

Staffing For Effective Digital Preservation

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2014-10-03 14:23:22
787Hashing / Key management / Cryptographic software / HMAC / FIPS 140-2 / Key Wrap / FIPS 140 / Key size / CryptGenRandom / Cryptography / Cryptography standards / Advanced Encryption Standard

Microsoft Word - 1a - Oristar SP.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 17:26:15
788Artificial intelligence / K-nearest neighbor algorithm / Locality-sensitive hashing / Nearest neighbor search / Hash function / Hash table / Search engine indexing / Statistical classification / Information science / Search algorithms / Information retrieval

Instance-based bird species identification with undiscriminant features pruning - LifeCLEF 2014 Alexis Joly1 , Julien Champ2 , and Olivier Buisson3 1

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2014-07-24 10:41:08
789Windows Vista / SYS / Installation software / Software distribution

ATTENTION: ACTION REQUIRED BEFORE[removed]OR IVES WILL STOP WORKING ON YOUR COMPUTER Because of security vulnerabilities with the certificate hashing encryption algorithm called SHA1, the industry is not allowing any

Add to Reading List

Source URL: www.idph.state.ia.us

Language: English - Date: 2014-10-15 11:17:25
790Cryptographic software / Internet protocols / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / Cryptographic hash function / Cryptographic Module Validation Program / FIPS 140 / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1c - Globo Mobile FIPS 140 Security Policy v1-1.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-18 11:12:12
UPDATE