<--- Back to Details
First PageDocument Content
Computing / Error detection and correction / Search algorithms / SHA-1 / Radio-frequency identification / Hash function / Collision / SHA-2 / RIPEMD / Cryptographic hash functions / Hashing / Cryptography
Date: 2008-07-17 06:16:12
Computing
Error detection and correction
Search algorithms
SHA-1
Radio-frequency identification
Hash function
Collision
SHA-2
RIPEMD
Cryptographic hash functions
Hashing
Cryptography

Add to Reading List

Source URL: events.iaik.tugraz.at

Download Document from Source Website

Share Document on Facebook

Similar Documents

SECURITY AND PRIVACY OF RADIO FREQUENCY IDENTIFICATION M ELANIE R. R IEBACK This work was carried out in the ASCI graduate school. ASCI dissertation series number 166.

DocID: 1uvE6 - View Document

PASSPORT ANNOUNCEMENT New ePassports to begin being issued The U.S. Department of State reports that U.S. passports issued after October 2006 will contain embedded radio frequency identification chips that carry the hold

DocID: 1uc0G - View Document

Bridge Scour Measurements Using Radio Frequency Identification (RFID) Technology Achilleas Tsakiris, Thanos Papanicolaou and Iordanis Moustakidis IIHR- Hydroscience & Engineering, Dpt. of Civil and Environmental Engineer

DocID: 1sLf0 - View Document

Radio Frequency Identification, 12 April 2005 – pFair Haven, New JerseyClay Street

DocID: 1sqKJ - View Document

Food safety / Forest certification / Barcodes / Radio-frequency identification / Software engineering / Traceability / Produce traceability

Traceability Can Make Or Break A Company in this Era!

DocID: 1rtJR - View Document