Vector Security

Results: 220



#Item
31Signal processing / Electronic test equipment / Data transmission / Data security / Wireless networking / Vector signal analyzer / Phase-shift keying / Baseband / IEEE 802.11 / Telecommunications engineering / Electronic engineering / Technology

Active Attacks Against Modulation-based Radiometric Identification RPI Department of Computer Science Technical ReportMatthew Edman and B¨ ulent Yener

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2009-08-03 15:32:20
32International relations / Philosophy / Bioethicists / Epistemologists / Nayef Al-Rodhan / Graduate Institute of International and Development Studies / Maison de la Paix / Geneva Centre for Security Policy / Thomas J. Biersteker / Year of birth missing / Political scientists / Academia

GCSP_logo_vector_pantone U

Add to Reading List

Source URL: www.gcsp.ch

Language: English
33Advantage / Chosen-ciphertext attack / Initialization vector / Chosen-plaintext attack / Ciphertext / One-time pad / RSA / Cipher / Plaintext-aware encryption / Cryptography / Semantic security / Ciphertext indistinguishability

U.C. Berkeley — CS276: Cryptography Professor David Wagner Lecture 8 February 9, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
34One-time pad / Block cipher / Chosen-plaintext attack / RSA / Cipher / Caesar cipher / Advantage / Ciphertext stealing / Initialization vector / Cryptography / Ciphertext / Block cipher modes of operation

CS 161 Computer Security Spring 2010

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2010-03-08 01:45:53
35Vision / Statistical classification / Support vector machine / SVM / Eigenface / Orientation / FERET database / Computer vision / Statistics / Artificial intelligence

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. XX, NO. XX, XXXFace Verification across Age Progression using Discriminative Methods

Add to Reading List

Source URL: www.dabi.temple.edu

Language: English - Date: 2009-11-17 07:54:12
36Electronic engineering / Cryptography / Television / Television technology / DVB-CPCM / Digital Video Broadcasting / Block cipher modes of operation / DVB-C / Initialization vector / DVB / Broadcast engineering / MPEG

TSV1Digital Video Broadcasting (DVB); Content Protection and Copy Management (DVB-CPCM); Part 5: CPCM Security Toolbox

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2011-02-18 09:44:13
37Infrastructure / United States Department of Homeland Security / Security / Humanitarian aid / Resilience / Critical infrastructure protection / Psychological resilience / Critical infrastructure / National security / Public safety / Emergency management

Global digital mesh network, vector illustration

Add to Reading List

Source URL: www.tisn.gov.au

Language: English - Date: 2015-05-25 22:01:44
38Inspectors general / Afghanistan / Special Inspector General for Afghanistan Reconstruction / Afghan National Security Forces / Afghan National Army / Combined Security Transition Command – Afghanistan / Afghan National Police / War in Afghanistan / Inspector General / Asia / Military of Afghanistan / Military

SIGAR VECTOR LOGO_updated

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-03-03 13:35:16
39Vector calculus / Albedo / National Security Agency / Measurement / National security / Transport phenomena / Climate forcing / Climatology / Radiative flux

Radiative Processes Working Group: Value Added Product (VAP) Updates Sally McFarlane RPWG Translator RPWG Breakout March 23,2009

Add to Reading List

Source URL: www.arm.gov

Language: English - Date: 2013-08-02 14:36:08
40Block cipher / Ciphertext / Cipher / Semantic security / RSA / Stream cipher / Ciphertext stealing / Blum–Goldwasser cryptosystem / Cryptography / Authenticated encryption / Initialization vector

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 05:49:18
UPDATE