Public key fingerprint

Results: 700



#Item
21Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
22Cryptography / Identification / Surveillance / Fingerprint recognition / Fingerprint / Public key fingerprint / Secure multi-party computation / Minutiae / Fingerprint Verification Competition / Fingerprints / Biometrics / Security

Poster: Secure Computation of Fingerprint Alignment and Matching Fattaneh Bayatbabolghani and Marina Blanton Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN, USA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
23Criminal records / Security / Surveillance / Law / Identification / Public key fingerprint / Criminal Justice Information Services Division / Criminal Justice Information Services / Federal Bureau of Investigation / Biometrics / Fingerprints / Criminal investigation

TEXAS DEPARTMENT OF PUBLIC SAFETY CRIME RECORDS SERVICE Access & Dissemination Bureau PROCEDURE FOR REVIEW OF PERSONAL CRIMINAL HISTORY RECORD INFORMATION It is the policy of the Texas Department of Public Safety (DPS) t

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-06-04 05:10:13
24Government / Identification / Fingers / Human anatomy / Identity document / Criminal record / Public key fingerprint / Nevada / Federal Bureau of Investigation / Security / Biometrics / Fingerprints

To Obtain a Copy of Nevada Criminal History Records The Nevada Criminal History Repository provides personal criminal history record information for the State of Nevada only. We cannot provide information for other stat

Add to Reading List

Source URL: www.fingerprintsreno.com

Language: English - Date: 2014-06-30 19:20:49
25Identification / Fingers / Human anatomy / United States Coast Guard Auxiliary / Identity document / Public key fingerprint / Form / Cryptography / Security / Biometrics / Fingerprints

WORD nmchecklist_2007JAN10R001.doc

Add to Reading List

Source URL: a082.uscgaux.info

Language: English - Date: 2007-01-17 20:32:52
26Medicine / Fingers / Human anatomy / Identification / Security / Twin / X-ray / Public key fingerprint / Biometrics / Fingerprints / Biology

CALIFORNIA STATE SCIENCE FAIR 2004 PROJECT SUMMARY Name(s) Camille M. Shanahan

Add to Reading List

Source URL: www.usc.edu

Language: English - Date: 2004-05-21 21:01:32
27Security / Human anatomy / Identification / Surveillance / Finger / Public key fingerprint / Henry Classification System / Fingerprints / Biometrics / Fingers

Microsoft Word - Grv26A.doc

Add to Reading List

Source URL: www.registeredoffenderslist.org

Language: English - Date: 2012-12-06 20:10:59
28Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
29Fingers / Human anatomy / Identification / Texas Department of Public Safety / Surveillance / Public key fingerprint / Name change / Integrated Automated Fingerprint Identification System / Biometrics / Fingerprints / Security

TEXAS DEPARTMENT OF PUBLIC SAFETY

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-06-04 05:10:13
30Fingerprint / Human anatomy / Identification / Security / Computing / Demosaicing / Public key fingerprint / Digital camera / JPEG / Fingerprints / Digital photography / Biometrics

Sensor Noise Camera Identification: Countering Counter-Forensics

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-12-18 20:54:42
UPDATE