Visual cryptography

Results: 37



#Item
11Cryptography / Password / Password manager / Password synchronization / Security / Access control / Computer security

Poster: Visual Password Checker Kyriakos Kafas Nouf Aljaffan Shujun Li

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:52
12Codebook / Vector quantization / Code / Feature / Visual descriptors / Artificial intelligence / Applied mathematics / Computer vision / Cryptography / Image processing

Locality-constrained Linear Coding for Image Classification Jinjun Wang† , Jianchao Yang‡ , Kai Yu§ , Fengjun Lv§ , Thomas Huang‡ , and Yihong Gong† † Akiira Media System, Palo Alto, California ‡ Beckman In

Add to Reading List

Source URL: www.ifp.illinois.edu

Language: English - Date: 2014-03-12 02:56:18
13Key management / HTTP / Secure communication / X.509 / Public key certificate / Internet Information Services / HTTP Secure / Form / Thawte / Cryptography / Public-key cryptography / Cryptographic protocols

Visual Intercept Tech Tip - How to Configure a Visual Intercept Web site as a Secure Site

Add to Reading List

Source URL: www.elsitech.com

Language: English - Date: 2014-01-31 12:54:24
14Visual cryptography / Cryptographic protocols / Key management / Digital photography / Image processing / Secret sharing / Pixel / Computing / Steganography / Cryptography / Computer graphics / Espionage

A Threshold Visual Cryptography Scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:45:43
15Election fraud / Voting / Electronic voting / Information society / Ballot / Voting machine / Electoral fraud / Visual cryptography / Approval voting / Politics / Cryptography / Elections

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
16Key management / Notary / Public-key cryptography / Cyberwarfare / Cryptography / Civil law / Digital signature

The European Commission visual identity manual - Audiovisual signature

Add to Reading List

Source URL: ec.europa.eu.

Language: English - Date: 2013-05-03 05:31:12
17Shōnen manga / Japanese heraldry / Mon / Anime series

3-9 Secret Sharing Scheme Using Natural Language Text TAKIZAWA Osamu, YAMAMURA Akihiro, and MAKINO Kyoko Modifying the idea of the visual cryptography, we propose a method of sharing a secret key using natural language t

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:15
18Dd / System software / Computing / Cryptography / Padding

VISUAL BASIC REVERSED - A decompiling approach Author: AndreaGeddon Abstract Keywords: Reverse Code Engineering, Visual Basic, VB, Decompiling Frameworks are getting more and more popular today, Visual Basic is one of th

Add to Reading List

Source URL: www.reteam.org

Language: English - Date: 2009-05-17 13:10:52
19Architecture / Bathrooms / Visual arts / Public-key cryptography / Plumber / Building code / Public key certificate / Plumbing / Construction / Building engineering

CERTIFICATE OF COMPLETION (PLUMBING WORK) Section [removed] Form 21

Add to Reading List

Source URL: www.justice.tas.gov.au

Language: English - Date: 2014-07-03 02:26:26
20Public key certificate / Public-key cryptography / Holcim / BRE / Bucharest / Romania / Concrete / Visual arts / Construction / Europe / Electronic commerce / Key management

Certificate of Approval Certificate Number: RS 0019 Issue: 01 Holcim (Romania) S.A.

Add to Reading List

Source URL: www.holcim.ro

Language: English - Date: 2014-09-08 04:57:22
UPDATE