Key generation

Results: 481



#Item
121Entertainment / Transport / Plarail / Tomica / Licca-chan / Takara / Kantaro Tomiyama / Optimus Prime / Furby / Takara Tomy / Dolls / Toy trains

For Immediate Release Christmas 2012 Product Guide Key Trends this Year: Smartphones, Skytree & Tokyo Station, Multi-Generation Toys, Ageless Beauty, Sugi-chan

Add to Reading List

Source URL: www.takaratomy.co.jp

Language: English - Date: 2012-11-25 23:53:17
122FIPS 140-2 / Cryptographic primitive / Block cipher / Key generation / Key / Symmetric-key algorithm / Random number generation / Algorithm / Computer security / Cryptography / Key management / Formal sciences

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

Add to Reading List

Source URL: untruth.org

Language: English - Date: 2014-12-30 15:45:55
123Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
124Randomness / Tamper resistance / Public-key cryptography / Key size / Side channel attack / Smart card / Key generation / Challenge-response authentication / Cryptography / Key management / Physical Unclonable Function

Read-Proof Hardware from Protective Coatings Pim Tuyls, Geert-Jan Schrijen, Boris Skoric Jan van Geloven, Nynke Verhaegh, Rob Wolters Philips Research Laboratories Prof. Holstlaan 4, 5656 AA Eindhoven, The Netherlands

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:25
125Cloud storage / Internet of Things / Data center / Internet / IICCRD / Carrier cloud / Computing / Cloud computing / Centralized computing

The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds” Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-31 04:29:05
126Human resource management / Competency-based recruitment

ATP Public Sector Special Interest Group (SIG) Mission Statement The public sector faces two key challenges – managing in times of austerity and the impending retirement of the baby boom generation with the significant

Add to Reading List

Source URL: www.testpublishers.org

Language: English - Date: 2014-04-04 09:35:57
127Automated theorem proving / Concolic testing / Symbolic execution / Reliability engineering / KeY / Code injection / Function / Mathematics / Formal methods / Systems engineering

Reliability Digest, NovemberExploit Generation from Software Failures Shih-Kun Huang Information Technology Service Center National Chiao Tung University

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:02:54
128Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
129Universal Serial Bus / Smartphones / Portable media players / Freebox / Archos Generation 5 / Computer hardware / Linux-based devices / USB flash drive

Appception: S3 Share, Store, Stream Key Features: WiFi or wired devices (plug-and-play) Create personal network

Add to Reading List

Source URL: www.appception.com

Language: English - Date: 2015-01-09 19:27:58
130Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
UPDATE