Public computer

Results: 14618



#Item
361Electric power distribution / Electric power / Smart grid / Public services / Emerging technologies / Smart meter / Automatic meter reading / Meter data management / ANSI C12.22 / Electricity meter / Computer security / Electrical grid

CERTICOM WHITEPAPER SERIES Critical Infrastructure Protection for AMI Using a Comprehensive Security Platform February 2009

Add to Reading List

Source URL: www.certicom.com

Language: English - Date: 2010-10-20 19:21:13
362Cryptography / Computing / Dining cryptographers problem / Public-key cryptography / Crowds / Communications protocol / Anonymity / Tor

Yale University Department of Computer Science Security Analysis of Accountable Anonymity in Dissent Ewa Syta Aaron Johnson Henry Corrigan-Gibbs

Add to Reading List

Source URL: ohmygodel.com

Language: English - Date: 2014-08-17 14:48:08
363

PARCC Computer-based Field Test: Technical Resources Guide Introduction In spring 2014, more than one million students in public schools across the country participated in the field testing of new computer-based assessme

Add to Reading List

Source URL: massparcctrial.files.wordpress.com

Language: English - Date: 2015-03-03 21:56:17
    364

    SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT Executive Order 10450, 9397; and Public Law, the Computer Fraud and Abuse Act. AUTHORITY: PRINCIPAL PURPOSE: To record names, signatures, and other

    Add to Reading List

    Source URL: www.dtic.mil

    Language: English - Date: 2014-11-25 11:39:13
      365

      “Computer science belongs in every public school, right next to biology, chemistry,

      Add to Reading List

      Source URL: hourofcode.com

      - Date: 2016-01-04 13:56:01
        366

        Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes Matthias Schmidt, Niels Fallenbeck, Matthew Smith, Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerw

        Add to Reading List

        Source URL: www.dcsec.uni-hannover.de

        Language: English - Date: 2010-11-03 12:17:51
          367Computing / Network protocols / Message-oriented middleware / Distributed computing architecture / Computer networking / Content centric networking / Email / Publishsubscribe pattern / Hypertext Transfer Protocol / Public-key cryptography

          Demo:Content-based Push/Pull Message Dissemination for Disaster Message Board Tomohiko Yagyu Kenichi Nakamura

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-01 13:44:44
          368

          Public Perception of CG • Games Computer Graphics • Movies

          Add to Reading List

          Source URL: www.graphics.rwth-aachen.de

          Language: English - Date: 2015-04-09 02:53:45
            369

            About us Access Computer Training offers computer training programs to the general public, corporate and senior communities, WIA recipients, Veterans, those with disabilities and individuals. We work closely with the Pas

            Add to Reading List

            Source URL: www.accesscomputertraining.com

            Language: English - Date: 2015-06-11 14:57:52
              370Alan Turing / Cryptography / Turing machine / Computability theory / Models of computation / Codebreaker / Public-key cryptography / Known-plaintext attack / Cipher / Turing / Encryption / Cryptanalysis

              ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

              Add to Reading List

              Source URL: www.cs4fn.org

              Language: English - Date: 2012-11-21 11:20:28
              UPDATE