Cryptography

Results: 21893



#Item
911Cryptography / Economy / Business / E-commerce / Email / Public key certificate / PayPal / Fax / Register

Registration/Recording Change of Ownership/Address Jack Russell Terrier Club of Canada Change in Ownership (Registered Terrier) If the Terrier was registered with the JRTCC after 1 Feb 1996, both Part I and Part II of th

Add to Reading List

Source URL: www.jrtcc.com

Language: English - Date: 2015-09-10 19:58:52
912Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
913Cryptography / Moshi /  Tanzania / Mount Kilimanjaro / Tick / Medical history / Public key certificate / Medicine

Microsoft Word - DOT_LLPT_Application_form.doc

Add to Reading List

Source URL: www.tatcot.org

Language: English - Date: 2015-11-12 06:06:58
914Cryptography / Dining cryptographers problem / Secure multi-party computation / Secret sharing / Verifiable secret sharing / Public-key cryptography / Cryptographic protocol / Blob / David Chaum

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16
915Cryptography / Public-key cryptography / Key management / Public key infrastructure / E-commerce / Public key certificate / Email

Microsoft Word - Official Graduate Certificate Request Form.docx

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2016-05-12 09:04:45
916National Instructional Materials Accessibility Standard / Special education / Cryptography law / Data / Copyright law of the United States / Password / World Wide Web / Digital rights management / Computing / Information / Copyright

Microsoft Word - Jan_2008_LUA.doc

Add to Reading List

Source URL: nimac.us

Language: English - Date: 2016-06-24 12:30:38
917Government / Security / Cybercrime / Cyberwarfare / National security / Computer network security / Computer security / Cryptography / Cyber / United States Department of Homeland Security

I 114TH CONGRESS 2D SESSION H. R. 5064

Add to Reading List

Source URL: docs.house.gov

Language: English
918Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
919Security / Prevention / Cryptography / Safety / Crime prevention / Information governance / National security / Procore / Password / Computer security / Internet privacy / Encryption

Security Overview Understanding the need to address security concerns, Procore has created a multi-tiered approach to ensuring data security and application stability, both integral to maintaining the safekeeping of your

Add to Reading List

Source URL: procore.com

Language: English - Date: 2016-01-08 11:07:49
920Theoretical computer science / Quantum information science / Quantum computing / Quantum mechanics / Quantum information theory / Quantum cryptography / Emerging technologies / Quantum channel / Quantum error correction / Quantum information / Density matrix / Privacy

Private quantum subsystems and error correction Tomas JochymO’Connor Privacy & error correction

Add to Reading List

Source URL: www.qec14.ethz.ch

Language: English - Date: 2015-01-28 07:57:17
UPDATE