Ibiblio

Results: 642



#Item
31The Science of Security  Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

The Science of Security Provable Security in the Real World Provable security plays an important role in the design and analysis of systems using cryptography. However,

Add to Reading List

Source URL: www.ibiblio.org

Language: English - Date: 2011-11-15 16:55:16
    32

    PDF Document

    Add to Reading List

    Source URL: distro.ibiblio.org

    - Date: 2012-11-22 10:33:11
      33

      PDF Document

      Add to Reading List

      Source URL: distro.ibiblio.org

      - Date: 2014-05-21 16:30:18
        34Looking inside the (Drop) box Dhiru Kholia Openwall / University of British Columbia   Abstract

        Looking inside the (Drop) box Dhiru Kholia Openwall / University of British Columbia Abstract

        Add to Reading List

        Source URL: distro.ibiblio.org

        Language: English - Date: 2013-08-15 14:43:39
          35Apps per smartphone  Applicazioni per dispositivi mobili per biblioteche e archivi di contenuto culturale iBiblio - App per consultazione di cataloghi di

          Apps per smartphone Applicazioni per dispositivi mobili per biblioteche e archivi di contenuto culturale iBiblio - App per consultazione di cataloghi di

          Add to Reading List

          Source URL: www.cgsi.it

          Language: Italian - Date: 2013-02-19 04:48:33
            36REDUCING THE ADVERSARIAL BURDEN ON PRESIDENTIAL APPOINTEES: Feasible Strategies for Fixing the Presidential Appointments Process* Terry Sullivan, Executive Director, The White House Transition Project Political Science,

            REDUCING THE ADVERSARIAL BURDEN ON PRESIDENTIAL APPOINTEES: Feasible Strategies for Fixing the Presidential Appointments Process* Terry Sullivan, Executive Director, The White House Transition Project Political Science,

            Add to Reading List

            Source URL: www.ibiblio.org

            Language: English - Date: 2009-02-25 10:53:22
              37IPv6  What, Why, How Jen Linkova aka Furry furry – at -openwall.com Openwall, Inc

              IPv6 What, Why, How Jen Linkova aka Furry furry – at -openwall.com Openwall, Inc

              Add to Reading List

              Source URL: distro.ibiblio.org

              Language: English - Date: 2009-03-26 03:56:21
                38

                PDF Document

                Add to Reading List

                Source URL: distro.ibiblio.org

                - Date: 2003-01-25 06:33:30
                  39Reinventing Technology:  Artificial Intelligence from the Top of a Sycamore Tree Harry Halpin  Scotland­Indymedia Institute for Communicating and Collaborative Systems

                  Reinventing Technology:  Artificial Intelligence from the Top of a Sycamore Tree Harry Halpin Scotland­Indymedia Institute for Communicating and Collaborative Systems

                  Add to Reading List

                  Source URL: www.ibiblio.org

                  Language: English - Date: 2006-03-26 21:21:51
                    40Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni  University of Zagreb, Croatia

                    Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni University of Zagreb, Croatia

                    Add to Reading List

                    Source URL: distro.ibiblio.org

                    Language: English - Date: 2014-07-23 00:08:16