<--- Back to Details
First PageDocument Content
Internet television / Videotelephony / Internet broadcasting / Freeware / Web 2.0 / IPTV / Skype / Video on demand / Joost / Software / Computing / Digital media
Date: 2010-12-12 09:17:26
Internet television
Videotelephony
Internet broadcasting
Freeware
Web 2.0
IPTV
Skype
Video on demand
Joost
Software
Computing
Digital media

http://www.pcworld.com/article/id,article.html

Add to Reading List

Source URL: www.raketu.com

Download Document from Source Website

File Size: 44,00 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

DocID: 1xVaG - View Document

Cryptography / Public-key cryptography / Post-quantum cryptography / Smart cards / Hash-based cryptography / Digital signature / Cryptographic hash function / Java Card / Hash function / Security token / Cryptographic primitive / XMSS

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 , and Jan Verschuren1 ? 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xV0o - View Document

Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

DocID: 1xUSb - View Document

Computing / Electronic engineering / Theoretical computer science / Electronic design automation / Service choreography / Formal verification / Orchestration / Autonomic computing / Transition / Business Process Execution Language / High-level synthesis / Systems engineering

Synthesis and verification of self-aware systems Radu Calinescu, Marco Autili, Javier C“amara, Antinisca Di Marco, Simos Gerasimou, Paola Inverardi, Alexander Perucci, Nils Jansen, Joost-Pieter Katoen, Marta Kwiatkowska

DocID: 1xU2x - View Document