The Counter

Results: 11362



#Item
1Software / Firefox add-ons / Online advertising / Google Chrome extensions / Ad blocking software / Advertising-free media / Privacy Badger / Ghostery / Adblock Plus / NoScript / AdBlock / Ad blocking

Adblocking and Counter-Blocking: A Slice of the Arms Race Rishab Nithyanand Stony Brook University Sheharbano Khattak University of Cambridge

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:13
2Cryptography / Block cipher modes of operation / Message authentication codes / Finite fields / Block cipher / CBC-MAC / Keystream / One-key MAC / Block size / Galois/Counter Mode / XXTEA

The Missing Difference Problem, and its Applications to Counter Mode Encryption? Ga¨etan Leurent and Ferdinand Sibleyras Inria, France {gaetan.leurent,ferdinand.sibleyras}@inria.fr

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
3Foreign relations / Law / Government / Digital subscriber line / Energy conservation / Energy policy / International Energy Agency Energy in Buildings and Communities Programme / Low-energy building

China has increased tariffs on most textile, apparel, accessories, footwear, and travel goods products exported from the United States by 5 to 10 percentage points. Tariffs have been increased through a series of counter

Add to Reading List

Source URL: otexa.trade.gov

Language: English - Date: 2018-10-02 10:41:30
4Economy / Finance / Money / Financial markets / Systemic risk / Mathematical finance / Financial risk / Over-the-counter / Stock market / Trade Repository / Derivative / Central counterparty clearing

Incentives to centrally clear over-the-counter (OTC) derivatives: A post-implementation evaluation of the effects of the G20 financial regulatory reforms

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2018-08-23 04:11:54
5Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
6

[723] VOL. CCCXXIX OVER THE COUNTER SALES $2·75 INCLUDING G.S.T.

Add to Reading List

Source URL: www.gazette.tas.gov.au

Language: English - Date: 2017-09-19 20:00:09
    7

    DIY Kit 154. FOUR DIGIT PRESETTABLE DOWN COUNTER INTRODUCTION This is a low cost 4 Digit Presettable Down Counter with output and reset. The count input can be used for both high and low speed counting applications. The

    Add to Reading List

    Source URL: www.ozitronics.com

    Language: English - Date: 2003-07-26 21:34:38
      8

      The Subtle Connection Between Counter-terrorism Strategies and Humiliation © Emmanuela C. Del Re Presentation held at the 2009 Workshop on Humiliation and Violent Conflict, Columbia University, New York, December 10-11,

      Add to Reading List

      Source URL: www.humiliationstudies.org

      - Date: 2015-03-17 17:55:29
        9

        Counter terrorism policy and the space for student democracy in UK universities Narzanin Massoumi University of Liverpool This paper considers the role of UK counter terrorism policy in shaping the

        Add to Reading List

        Source URL: rc21-mexico16.colmex.mx

        Language: English - Date: 2016-07-14 17:55:36
          10

          Breaking the Organized Crime and Counter-Terrorism Nexus: Identifying Programmatic Approaches MEETING REPORT INTRODUCTION Security Council Resolution), Threats to international peace and security, called upon

          Add to Reading List

          Source URL: unicri.it

          Language: English - Date: 2017-03-24 11:39:58
            UPDATE