Crypt

Results: 686



#Item
541Password / Cryptography / Network security / Two-factor authentication / Crypt / Password strength / Password manager / Security / Computer security / Access control

State of Vermont User Password Policy and Guidelines ®

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2012-11-30 11:34:07
542Software / Computer vision / Artificial intelligence / Computing / TRE / Crypt / Hash function

    Definition  and  Terminology  of     Approximate  Matching   Approximate  matching  is  a  technique  for  identifying  similarities  between  or  among  

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2013-08-02 17:03:52
543National Software Reference Library / Security Content Automation Protocol / National Vulnerability Database / Dynamic-link library / Crypt / Vulnerability / Computer security / Computing / Cyberwarfare

Cyber-Infrastructure Uses for the NIST NSRL Douglas
White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2009-05-20 11:51:25
544Hashing / MD4 / Search algorithms / MD5 / Cyclic redundancy check / Checksum / SHA-1 / Crypt / Hash function / Error detection and correction / Cryptography / Cryptographic hash functions

SELECTION OF HASHING ALGORITHMS Tim Boland Gary Fisher JUNE 30, 2000 INTRODUCTION

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2002-12-31 14:22:10
545Metadata / Computer file / Information / Data / Computing / Data management / Forensic Toolkit / Crypt

Current Activities in the November 7, 2006 Project Support The NSRL project is supported by

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-11-06 09:17:10
546Joan Daemen / SHA-2 / John Kelsey / Crypt / Lane / Mathematics / Computing / NIST hash function competition / Cryptographic hash functions / Keccak

SHA[removed]Workshop August 22, 2014 University of California, Santa Barbara [Corwin Pavilion] Friday August 22, 2014 9:00 – 9:10

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-29 13:08:02
547Cemetery / Burial vault / Burial / Crypt / Death customs / Culture / Cremation

CITY OF APOPKA EDGEWOOD/GREENWOOD CEMETERY CEMETERY FEES RESIDENT

Add to Reading List

Source URL: www.apopka.net

Language: English - Date: 2013-09-16 16:35:01
548Software / SHA-2 / SHA-1 / Md5sum / Hash list / Public key fingerprint / Fingerprint / Sha1sum / Crypt / Cryptographic hash functions / System software / Computing

Identification of Known Files on Computer Systems AAFS 2005 Douglas White Michael Ogata

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2005-02-23 13:18:40
549Search algorithms / Computing / National Software Reference Library / United States Department of Commerce / Hash function / Crypt / Hash list / Information retrieval / Artificial intelligence / Error detection and correction / Hashing / Cryptographic hash functions

Hashing of File Blocks: When Exact Matches Are Not Useful Douglas White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2008-02-25 14:12:49
550SHA-2 / SHA-1 / MD4 / MD5 / Crypt / Fingerprint / Public key fingerprint / Hash function / Preimage attack / Cryptographic hash functions / Cryptography / Computing

NIST’s National Software Reference Library Douglas White, Software Diagnostics & Conformance Testing Division

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-11-16 07:11:22
UPDATE