The Crypt

Results: 208



#Item
11Cryptography / Passphrase / Obfuscation / Computer security / Crypt

Automatic Problem Generation for Capture-the-Flag Competitions Jonathan Burket Peter Chapman

Add to Reading List

Source URL: jburket.com

Language: English - Date: 2015-08-11 16:10:08
12Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
13Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Security hacker / Password strength / Password policy

MISSION: To broaden the knowledge and promote values necessary for Maine’s local and county government Administrators to better serve their communities. A publication of the Maine Town, City

Add to Reading List

Source URL: www.mtcma.org

Language: English - Date: 2015-07-02 11:09:14
14Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-01 10:05:10
15Kansas City metropolitan area / Geography of the United States / Mausoleum / United States / Livermore /  California / Geography of California / Crypt / Olathe /  Kansas / Tomb / Johnson County /  Kansas / Cemetery / Kansas

The Mausolea of Johnson County, Kansas By Linda K. Lewis 1 October 2007 The Mausolea of Johnson County, Kansas

Add to Reading List

Source URL: joco-ksgenweb.cottonhills.net

Language: English - Date: 2014-10-13 23:09:19
16Ebola / Economic Community of West African States / Sierra Leone / West African Ebola virus epidemic / Ebola virus disease / Ebola virus epidemic in Sierra Leone / International Mutual Aid

DEMAC & ABC EVENT Friday 8 July 2016, 18:00 – 21:30 InSpire at St Peter’s The Crypt, St Peter’s Church, Liverpool Grove, London, SE17 2HH ‘Sierra Leone’s Recovery and the Role of the Diaspora’ The ABC & DEMAC

Add to Reading List

Source URL: www.afford-uk.org

Language: English - Date: 2016-07-24 14:04:02
17Disk encryption / Cryptographic software / Cryptography / Cross-platform software / Password / Erlang / Crypt / BitLocker / GBDE

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
18NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
19Cryptography / Password / Security / Cryptographic hash functions / Challengeresponse authentication / Crypt / Password cracking / Password policy

Visualizing Semantics in Passwords: The Role of Dates Rafael Veras Julie Thorpe Christopher Collins

Add to Reading List

Source URL: vialab.science.uoit.ca

Language: English - Date: 2015-09-22 16:31:59
20Cryptography / Password / Java applet / Dropbox / Applet / Crypt / Expect / Key derivation function / Password manager / Password policy

Improving the Password Selection Mechanism Richard M. Conlan Peter Tarasewich Northeastern University CC&IS

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 14:44:50
UPDATE