Key System

Results: 6849



#Item
381Search algorithms / K-nearest neighbors algorithm / Cryptography / K-d tree / Paillier cryptosystem / Public-key cryptography / Recommender system / Privacy / Encryption

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners Frank Li† † Richard Shin†

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-10-01 22:05:30
382Software / Computing / Database / Tar / Spreadsheet / Geographic information system / Data / Unique key / Extensible Storage Engine

dbSEABED Output Formats db9 Definitions Document Chris Jenkins () INSTAAR, University of Colorado Last edited: 19 Apr 2011

Add to Reading List

Source URL: instaar.colorado.edu

Language: English - Date: 2011-04-19 20:38:40
383Water / Matter / Africa / Water industry / Geographic data and information / Satellite broadcasting / Satellite imagery / Satellites / Geographic information system / Fresh water / Drinking water / Malawi

CASE STUDY 01 Geoserve Malawi Water Projects VHR Imagery Key to Bringing Clean Water to Malawians Malawi, located in southeast Africa, is one of the world’s most impoverished and least developed countries.

Add to Reading List

Source URL: www.euspaceimaging.com

Language: English - Date: 2014-11-04 03:52:32
384

WFSC Newsletter Issue 3 | JuneWorld Food System Center News WFSC News & Upcoming Events Annual Report 2014 The WFSC’s second Annual Report is now available. The report highlights some of the key activities

Add to Reading List

Source URL: www.worldfoodsystem.ethz.ch

Language: English - Date: 2016-03-04 17:33:40
    385

    Title: Implementation of an attack scheme on a practical QKD system Abstract: The stated goal of quantum key distribution (QKD) is to grow a secret key securely between two parties with a minimum of additional assumption

    Add to Reading List

    Source URL: qip2011.quantumlah.org

    Language: English - Date: 2011-01-09 06:09:29
      386Software / System software / Computing / Comic strip formats / Tab key / Empennage / X Window System / Mac OS X Lion

      theday_AdSizes-2015rjune.indd

      Add to Reading List

      Source URL: www.theday.com

      Language: English - Date: 2015-06-02 08:36:55
      387Cryptography / Cryptographic protocols / Public-key cryptography / Internet protocols / DiffieHellman key exchange / NeedhamSchroeder protocol / Communications protocol / Key exchange / Protocol composition logic / Interlock protocol

      Journal of Computer Security–482 IOS Press 423 A derivation system and compositional logic

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:12
      388Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Domain Name System / Start menu / Installation / Control Panel

      Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

      Add to Reading List

      Source URL: unbound.net

      Language: English - Date: 2015-05-20 02:41:14
      389Software / System software / Computing / Internet Standards / Internet protocols / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Unbound / Uninstaller / Start menu

      Manual for Unbound on Windows W.C.A. Wijngaards, NLnet Labs, May 2015 Introduction This manual aims to provide information about the Unbound server on the Windows platform. Included is installation,

      Add to Reading List

      Source URL: unbound.nlnetlabs.nl

      Language: English - Date: 2015-05-20 02:41:14
      390

      Donuts for DBAs II – The Migration to Oracle9i operating system and any other key support tools in the environment.

      Add to Reading List

      Source URL: www.xor.com.au

      Language: English - Date: 2006-10-21 02:33:44
        UPDATE