Crypt

Results: 686



#Item
551TRE / Crypt / Hash function / Artificial intelligence / Software / Computing / Computer vision / Cryptographic hash function / Cryptography / Hashing

Definition and Terminology of Approximate Matching Approximate matching is a technique for identifying similarities between or among digital objects, such as files, storage media, or network streams, which do not match

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2013-08-02 17:04:09
552Security / System software / Password / Crypt / Computer security

Class of Works Circumvention of Software - where the encryption needs to be circumvented due to unavailability of password(s) caused by absence, death, or termination. Summary of the Argument for the Exemption Difficulty

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2012-05-24 14:24:47
553Cemetery / Burial vault / Burial / Crypt / Death customs / Culture / Cremation

CITY OF APOPKA CEMETERY FEES RESIDENT NON-RESIDENT

Add to Reading List

Source URL: www.apopka.net

Language: English - Date: 2011-08-18 10:58:06
554Computer security / Crypt / Identity management / Identity correlation / OTPW / Password / Security / Access control

PDF Document

Add to Reading List

Source URL: aaicama.org

Language: English - Date: 2013-03-14 15:46:51
555Waterton / Montana / Geography of Canada / Cameron Lake / Rocky Mountains / Goat Haunt / Crypt Lake Trail / Waterton Lakes National Park / Glacier National Park / Physical geography

PDF Document

Add to Reading List

Source URL: www.pc.gc.ca

Language: English - Date: 2010-07-14 11:38:52
556Password / Data Encryption Standard / Crypt / Random number generation / Password strength / Cryptography standards / Cryptography / Randomness / Random password generator

FIPS 181, Automated Password Generator (APG)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-11-01 10:20:27
557Password / Crypt / Disk encryption / Internet / Software / Windows / Encrypting File System / Features new to Windows XP / Cryptographic software / Email / Computing

NC DHSR: Encrypting Files to Email to your new Windows 7 machine

Add to Reading List

Source URL: www.ncdhhs.gov

Language: English - Date: 2014-03-27 16:43:23
558Transport Layer Security / Public key infrastructure / Digital signature / Symmetric-key algorithm / Public key certificate / Crypt / Key size / Network Security Services / Certificate server / Cryptography / Public-key cryptography / Key management

Canada Customs Agence des douanes and Revenue Agency et du revenu du Canada Unclassified

Add to Reading List

Source URL: www.cra-arc.gc.ca

Language: English - Date: 2005-10-29 12:08:24
559Computing / USB flash drive / Security token / Smart card / Operating system / Universal Serial Bus / Mac OS X / Technology / Computer hardware / ISO standards / Ubiquitous computing

plug´n´crypt plug´n´crypt ® charismathics provides easy to use and flexible identity solutions through an affordable USB token. The plug´n´crypt token combines the functionality of a secure smart card with

Add to Reading List

Source URL: www.planc.biz

Language: English - Date: 2011-01-27 05:15:05
560SHA-1 / NIST hash function competition / SHA-2 / Keccak / Grøstl / ECRYPT / Crypt / RIPEMD / Tiger / Cryptographic hash functions / Error detection and correction / Cryptography

ICT[removed]ECRYPT II European Network of Excellence in Cryptology II Network of Excellence Information Society Technologies

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2013-01-18 12:34:52
UPDATE