Key code

Results: 1646



#Item
311Evaluation / Cognition / Behavior / Thought / Key Skills Qualification / Skill / Evaluation methods

MODULE TITLE Business Marketing and Sales Skills Module Code

Add to Reading List

Source URL: www.shu.ac.uk

Language: English - Date: 2014-10-08 07:50:38
312Transport / International Ship and Port Facility Security Code / Water / Security / Public key certificate / Port security / Law of the sea / International Maritime Organization / Water transport

zee[a nd seaports o Port security certificate Having regard to the provisions of the Port Security Act, Regutation I ECI noof the

Add to Reading List

Source URL: www.sagro.nl

Language: English - Date: 2014-08-29 03:05:52
313Corporations law / Codes of conduct / DiGi Telecommunications / Digi-Key / Business ethics / Corporation / Law / Ethical code / Ethics / Business / Applied ethics

Digi-Key Code of Ethics Doc Number: GDE.HR.001 Version: 1 Pg. 1 of 3

Add to Reading List

Source URL: www.digikey.de

Language: English - Date: 2014-10-31 10:57:35
314Algorithm / Public key certificate / Mind / Applied mathematics / Mathematics / Public-key cryptography / Priority queue / Abstraction

Reduced Certificates for Abstraction-Carrying Code ? Elvira Albert1 , Puri Arenas1 , Germ´an Puebla2 , and Manuel Hermenegildo2,3

Add to Reading List

Source URL: www.clip.dia.fi.upm.es

Language: English - Date: 2006-07-25 14:13:40
315Ciphertext indistinguishability / Public-key cryptography / Encryption / VMAC / Digital signature / Deterministic encryption / Advantage / Cipher / Galois/Counter Mode / Cryptography / Authenticated encryption / Message authentication code

Chapter 7 Message Authentication In most people’s minds, privacy is the goal most strongly associated to cryptography. But message authentication is arguably even more important. Indeed you may or may not care if some

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:25:35
316QR code / Causes / Computing / Android / Software / Computer architecture / Automatic identification and data capture / Barcodes / Encodings

DONATE - The National Funding Scheme Key Insights Report No 2 Reporting period: to end of June 2013 Introduction Welcome to the second Key Insights reports from the National

Add to Reading List

Source URL: downloads.nationalfundingscheme.org

Language: English - Date: 2013-11-25 12:11:04
317Council for the Curriculum /  Examinations & Assessment / Higher / Potential Regiment Officers course / A2 / Key Skills Qualification / Curriculum / Advanced Extension Award / Education / Evaluation / GCE Advanced Level

CCEA GCE Specification in Religious Studies For first teaching from September 2008 For first award of AS Level in Summer 2009 For first award of A Level in Summer 2010 Subject Code: 4610

Add to Reading List

Source URL: www.rewardinglearning.org.uk

Language: English - Date: 2014-11-25 07:52:31
318Health / United Kingdom labour law / Accessibility / Medical sociology / Disability Discrimination Act / Special education in the United Kingdom / Inclusion / United Kingdom employment equality law / Unfair dismissal in the United Kingdom / Law / Disability rights / Disability

KEY RECOMMENDATIONS FROM THE CODE OF PRACTICE FOR THE ELIMINATION OF DISCRIMINATION IN THE FIELD OF EMPLOYMENT AGAINST DISABLED PERSONS OR PERSONS WHO HAVE HAD A DISABILITY Recommendations This list of recommendations is

Add to Reading List

Source URL: www.staffcom.org.uk

Language: English - Date: 2013-07-26 06:29:55
319Ethics / Management / Social philosophy / Anti-racism / Equal opportunity / Recruitment / Affirmative action / Job hunting / European Charter for Researchers / Employment / Discrimination / Human resource management

KEY RECOMMENDATIONS FROM FAIR EMPLOYMENT IN NORTHERN IRELAND: CODE OF PRACTICE Recommendations This list of recommendations is intended to be used as a quick reference and a handy reminder covering only the Role of Emplo

Add to Reading List

Source URL: www.staffcom.org.uk

Language: English - Date: 2013-07-26 06:29:57
320Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
UPDATE