Key generation

Results: 481



#Item
31Semantics / Cognitive science / Cognition / Artificial intelligence / Science / Arts / Cognitive psychology / Computational creativity / Analogy / Structure mapping engine / Analogical models / Fluid Concepts and Creative Analogies

Story Representation in Analogy-Based Story Generation in Riu Jichen Zhu and Santiago Onta˜no´ n Abstract— Computational analogy offers a promising direction to algorithmically generating stories, a key challenge in

Add to Reading List

Source URL: game.itu.dk

Language: English - Date: 2010-08-10 12:41:00
32Cryptography / Software / Computer security / OpenPGP / Cryptographic software / Computer access control / USB / YubiKey / Gpg4win / GNU Privacy Guard / Public-key cryptography / Encryption

GnuPG Installation, Key Generation, & Decryption

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-12-15 16:56:28
33Cryptography / Dice / Diceware / Random number generation / Gaming / Passphrase / Randomness / Key management / Key / Mia

The DicewareT M Word List Diceware lets you make highly secure passphrases that are relatively easy to remember. To use the Diceware list you will need one or more dice. Dice come with many board games and are sold separ

Add to Reading List

Source URL: weber.fi.eu.org

Language: English
34Cryptography / Dice / Diceware / Random number generation / Passphrase / Randomness / Key management / Key / Craps / Mia / WASTE

The DicewareTM Word List — Beale’s Word List Diceware lets you make highly secure passphrases that are relatively easy to remember. To use the Diceware list you will need one or more dice. Dice come with many board g

Add to Reading List

Source URL: weber.fi.eu.org

Language: English
35Finance / Money / Economy / Demographics / Credit / Social economy / Zopa / Millennials / Financial technology / Peer-to-peer / Peer-to-peer lending / Generation X

‘Generation Spent’? Millennials are saving more than Gen X Millennials are more financially responsible than they’re given credit for, suggests Zopa research Key stats:   

Add to Reading List

Source URL: cdn.zopa.com

Language: English - Date: 2016-04-13 03:48:25
36

Five key recommendations for the second generation of the Covenant of Mayors FOREWORD Recognised as a leading example of successful EU multi-level governance, the

Add to Reading List

Source URL: www.klimabuendnis.org

Language: English - Date: 2015-06-02 09:55:44
    37Software engineering / Computer programming / Programming language theory / Abstract interpretation / Symbolic execution / Program analysis / KeY / Disassembler / Pattern matching / Forth / Symbolic / Concolic testing

    Transformation-Aware Symbolic Execution for System Test Generation Stephen McCamant Mathias Payer Dan Caselden

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    38

    A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

    Add to Reading List

    Source URL: www.lmt.ei.tum.de

    Language: English - Date: 2011-02-01 07:36:58
      39Renewable energy / Energy storage / Grid energy storage / Power engineering / Wind power / Distributed generation / Lidar / Energy technology / Renewable Energy Systems / Wind farm / Sustainable energy / 100% renewable energy

      energyengineering issue sixty one supplement 2015 power for the future KEY PLAYERS FROM ACROSS THE

      Add to Reading List

      Source URL: www.energyengineering.co.uk

      Language: English - Date: 2015-10-05 09:07:17
      40

      Secure and Privacy-Friendly Public Key Generation and Certification F´abio Borges∗ , Leonardo A. Martucci† , Filipe Beato‡ , and Max M¨uhlh¨auser∗ ∗ Technische Universit¨at Darmstadt, CASED – Telecoopera

      Add to Reading List

      Source URL: prisec.kau.se

      Language: English - Date: 2014-07-16 11:31:03
        UPDATE