Security question

Results: 867



#Item
841Data quality / Data validation / Validation / Evaluation / Form / Science / Pharmaceutical industry / Validity / Computer security

2010 Paper 4 Question 7 Introduction to Security (a) Briefly explain the following terms, and for each give one example of a technique that implements it: (i ) secure commitment;

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-26 09:50:50
842

2009 Paper 5 Question 9 Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2013-09-26 09:50:48
    843Ls / Filesystem permissions / Id / Access control / Unix / Computing / Ln / Append

    2008 Paper 4 Question 7 Introduction to Security

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-09-26 09:50:47
    844Data Encryption Standard / Symmetric-key algorithm / Cryptography / Ciphertext / Cipher

    2008 Paper 3 Question 8 Introduction to Security

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-09-26 09:50:47
    845Cryptographic hash function / Cipher / Password / Message authentication code / Public-key cryptography / Index of cryptography articles / Stream cipher / Cryptography / Block cipher / Key

    2007 Paper 3 Question 9 Introduction to Security (a) You have received a shipment of hardware random-number generators, each of which can output one 128-bit random number every 10 milliseconds. You suspect that one of t

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-09-26 09:50:45
    846Block cipher / Public-key cryptography / CMAC / Poly1305-AES / Cryptography / Message authentication codes / Cryptographic hash function

    2006 Paper 4 Question 10 Introduction to Security (a) Alice and Bob participate in a public-key infrastructure that enables them to exchange legally binding digital signatures. (i ) Name two reasons why, for some purpos

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-09-26 09:50:43
    847

    2006 Paper 3 Question 9 Introduction to Security

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    - Date: 2013-09-26 09:50:43
      848Cheating in video games

      2005 Paper 3 Question 9 Introduction to Security

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2013-09-26 09:50:41
        849Binary arithmetic / Numerical digit / Hexadecimal

        2004 Paper 3 Question 9 Introduction to Security

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2013-09-26 09:50:40
        850Secure communication / IEEE P1619 / Block cipher modes of operation / Cipher / Message authentication codes

        2003 Paper 3 Question 9 Introduction to Security

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2013-09-26 09:50:38
        UPDATE