Cryptographic engineering

Results: 331



#Item
311W_LAN_Access_Point_Bestellformulare_E_2014.indd

W_LAN_Access_Point_Bestellformulare_E_2014.indd

Add to Reading List

Source URL: book-fair.com

Language: English - Date: 2014-04-14 18:10:57
312Connecting to the Rovernet WPA2 Secured Wireless Network with the Windows Mobile 6 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in or

Connecting to the Rovernet WPA2 Secured Wireless Network with the Windows Mobile 6 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in or

Add to Reading List

Source URL: www.tc.mtu.edu

Language: English - Date: 2010-06-22 11:17:18
313Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc, San Diego [removed]

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:00
314Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Add to Reading List

Source URL: www.red-database-security.de

Language: English - Date: 2009-06-10 05:45:54
315Orthogonal frequency-division multiplexing / Wi-Fi Protected Access / DBm / Wi-Fi / Data / 11i / Technology / Telecommunications engineering / Cryptographic protocols / Computer network security / IEEE 802.11

I N T U I C O M BroadBand Solutions 5GHz[removed]GHz BROADBAND SPECIFICATIONS K E Y F E AT U R E S

Add to Reading List

Source URL: www.econolite.com

Language: English - Date: 2014-03-13 14:27:02
316Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy K. R. Rao

Add to Reading List

Source URL: www.nandakishore.com

Language: English - Date: 2006-12-26 18:14:17
317Alina Mihaela Oprea CONTACT INFORMATION Address Tel.

Alina Mihaela Oprea CONTACT INFORMATION Address Tel.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-11-30 10:40:05
318Security Evaluation of the Z-Wave Wireless Protocol

Security Evaluation of the Z-Wave Wireless Protocol

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2013-08-14 07:38:54
319A Comparison of Security in HomeRF versus IEEE802.11b Though the possibility of attacks similar to those leveled at 802.11b systems exist in

A Comparison of Security in HomeRF versus IEEE802.11b Though the possibility of attacks similar to those leveled at 802.11b systems exist in

Add to Reading List

Source URL: www.cazitech.com

Language: English - Date: 2012-04-15 22:00:28
320Journal of Theoretical and Applied Information Technology 10th May[removed]Vol. 51 No.1 © [removed]JATIT & LLS. All rights reserved.

Journal of Theoretical and Applied Information Technology 10th May[removed]Vol. 51 No.1 © [removed]JATIT & LLS. All rights reserved.

Add to Reading List

Source URL: www.jatit.org

Language: English - Date: 2013-05-11 01:49:05