Public key fingerprint

Results: 700



#Item
51Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: daniel-wilkerson.appspot.com

Language: English
52PGP / Cryptographic software / GNU Privacy Guard / Web of trust / Crypt / Digital signature / Public key fingerprint / Key / ElGamal encryption / Cryptography / Public-key cryptography / Key management

The GNU Privacy Handbook The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation Li

Add to Reading List

Source URL: www.gnupg.org

Language: English - Date: 2000-08-08 10:33:16
53Surveillance / Identification / Fingerprint recognition / BioAPI / Fingerprint / C++ / Public key fingerprint / Windows XP / Fingerprint Verification Competition / Fingerprints / Biometrics / Security

FxISO SDK FxISO Software Development Kit Technical specifications Features •

Add to Reading List

Source URL: www.biometrika.it

Language: English - Date: 2015-04-16 08:36:29
54Epistemology / Knowledge / Biometrics / Identification / Fingerprint / Reason / Public key fingerprint / Reproducibility / Falsifiability / Science / Philosophy of science / Fingerprints

Michele Triplett IAI Member, CLPE The Need to Validate Principles and the Value of Reproducible Results The primary quality assurance measure for fingerprint conclusions is verification, where a second analyst

Add to Reading List

Source URL: fprints.nwlean.net

Language: English - Date: 2012-08-25 12:50:06
55Security / Internet protocols / Internet standards / Secure communication / Man-in-the-middle attack / Public key fingerprint / Public-key cryptography / Authentication / Transport Layer Security / Cryptography / Cryptographic protocols / Computing

Talking To Strangers: Authentication in Ad-Hoc Wireless Networks Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Xerox Palo Alto Research Center 3333 Coyote Hill Road Palo Alto, CAbalfanz,smetters,stewa

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-11 23:13:47
56Public key fingerprint / Software engineering / Immutable object / Computer programming / Erasure / Fingerprint / Data erasure / Computing / Coding theory

1 Implementing Erasure Policies Using Taint Analysis Filippo Del Tedesco, Alejandro Russo, and David Sands Chalmers University of Technology, G¨oteborg, Sweden

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2010-11-16 07:34:14
57Fingerprint / Human anatomy / Identification / Security / Computing / Demosaicing / Public key fingerprint / Digital camera / JPEG / Fingerprints / Digital photography / Biometrics

Sensor Noise Camera Identification: Countering Counter-Forensics

Add to Reading List

Source URL: ws2.binghamton.edu

Language: English - Date: 2009-12-18 20:54:42
58Video processing / Security / Biometrics / Identification / Fingerprint / Science / Video copy detection / Cryptography / Public key fingerprint / Acoustic fingerprinting / Digital rights management / Digital video fingerprinting

PDF Document

Add to Reading List

Source URL: www.institut-national-audiovisuel.fr

Language: English - Date: 2011-08-12 05:49:32
59Cryptography / Identification / Automated fingerprint identification / National Crime Records Bureau / Public key fingerprint / Authentication / Fingerprints / Security / Biometrics

Notice for EoI for Fingerprint Enrolment Devices CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: www.ncrb.gov.in

Language: English - Date: 2012-01-12 04:00:42
60Fingerprints / Identification / Biometrics / Human anatomy / Public key fingerprint / Privacy policy / Information privacy / Personally identifiable information / Surveillance / Security / Privacy / Ethics

PDF Document

Add to Reading List

Source URL: www.pcpd.org.hk

Language: English - Date: 2014-12-05 02:51:31
UPDATE