Key System

Results: 6849



#Item
361Radio electronics / Electromagnetism / Electronics / Technology / Smart key / Radio-frequency identification / Remote keyless system / Antenna / Key / Relay / Loop antenna / Elevator

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aur´elien Francillon, Boris Danev, Srdjan Capkun Department of Computer Science ETH Zurich 8092 Zurich, Switzerland

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2011-05-09 09:06:22
362

RFID Fact Sheet What is RFID? Radio frequency identification (RFID) describes a system that uses radio waves to identify an object or person. There are three key components to an RFID system: •Tag:

Add to Reading List

Source URL: rfid.cs.washington.edu

Language: English - Date: 2009-06-17 12:32:51
    363Micronas / Elliptic curve cryptography / Cryptography / Hardware security module / High-bandwidth Digital Content Protection / BlackBerry Limited / Key management / Key

    Micronas Secures Production with Certicom KeyInject ® Micronas needed a secure system for transporting and embedding keys into silicon chips for use in consumer electronics. Certicom

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2008-11-09 16:17:51
    364Computational neuroscience / Neuroscience / Nervous system / Sensory systems / Artificial neural networks / Applied mathematics / Receptive field / Cerebellar model articulation controller / One-key MAC / Hash function / Contrast / Image segmentation

    UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

    Add to Reading List

    Source URL: incompleteideas.net

    Language: English - Date: 2013-04-20 17:24:26
    365Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Certificate authority / Public key certificate / Digital signature / Domain Name System Security Extensions / Self-signed certificate / Witness

    arXiv:1503.08768v2 [cs.CR] 23 NovKeeping Authorities “Honest or Bust” with Decentralized Witness Cosigning Ewa Syta, Iulia Tamas, Dylan Visher, David Isaac Wolinsky

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2015-11-23 23:32:06
    366Software / System software / File Explorer / Cut /  copy /  and paste / Control key / Menu / Menu bar / Classic Shell

    SHOULD I UPGRADE TO MACREX VERSION 8? MACREX VERSION 8 MACREX version 8 has so many new features that it is impossible to demonstrate them all in a single PPT file. Think

    Add to Reading List

    Source URL: www.macrex.com

    Language: English - Date: 2009-12-06 15:11:10
    367High-definition television / Copy protection / High-bandwidth Digital Content Protection / BlackBerry Limited / HDMI / Key management / DisplayPort / AMS

    Certicom Asset Management System KeyInject Module for HDCP ® Automates Key Logistics, Mitigates Financial Risk, and Delivers Proven ROI The world’s leading chip manufacturers already rely on Certicom AMS

    Add to Reading List

    Source URL: www.certicom.com

    Language: English - Date: 2015-04-21 15:40:25
    368

    Datasheet Camelot CAD Navigation System and Key Component of Synopsys Failure Analysis Product Line Overview

    Add to Reading List

    Source URL: www.synopsys.com

    Language: English - Date: 2015-09-25 15:15:29
      369Cryptography / Public-key cryptography / Key management / Internet protocols / Internet Standards / Cryptographic protocols / Named data networking / Authentication / Domain Name System Security Extensions / Key / Unique key / Transport Layer Security

      Schematizing Trust in Named Data Networking Yingdi Yu Alexander Afanasyev UCLA

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-01 13:18:57
      370Internet / Computing / Domain name system / Cryptography / Internet protocols / Internet Standards / DNSSEC / Public-key cryptography / Domain Name System Security Extensions / Name server / DNS spoofing / DNS hijacking

      MSc System and Network Engineering Research Project II Discovery method for a DNSSEC validating stub resolver

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2015-08-24 06:37:35
      UPDATE