Vector Security

Results: 220



#Item
81Vector space model / Okapi BM25 / Search engine indexing / Inverted index / Query language / Learning to rank / Book:Information retrieval / Information science / Information retrieval / Tf*idf

Introduction and Motivation Information Retrieval Basics A File System Search Security Model Implementation I: Postprocessing Implementation II: Query Integration Summary

Add to Reading List

Source URL: stefan.buettcher.org

Language: English - Date: 2006-04-07 00:53:44
82IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Ciphertext / Cryptography / Computer network security / Cryptographic protocols

Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley

Add to Reading List

Source URL: www.isaac.cs.berkeley.edu

Language: English - Date: 2001-02-02 14:52:13
83Criminal law / Ethics / Crime in Australia / Law enforcement / National security / Centre for European Policy Studies / Police / EPIN / Criminal justice / Law / Government / Legal professions

old paper with feather vector illustration

Add to Reading List

Source URL: www.ceps.edu.au

Language: English - Date: 2013-11-21 19:47:58
84Transport Layer Security / Block cipher modes of operation / Initialization vector / Padding / HTTP cookie / Chosen-plaintext attack / HTTP Secure / Ciphertext / WebSocket / Cryptography / Computing / Internet

Here Come The ⊕ Ninjas Thai Duong Juliano Rizzo May 13, 2011

Add to Reading List

Source URL: blog.tempest.com.br

Language: English - Date: 2011-09-27 11:00:14
85IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Chosen-plaintext attack / Cryptography / Cryptographic protocols / Computer network security

Intercepting Mobile Communications: The Insecurity of[removed]Nikita Borisov Ian Goldberg Zero-Knowledge Systems

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
86Affine geometry / Linear algebra / Binary decision diagram / Diagrams / Model checking / Artificial neuron / Affine transformation / Vector space / Algebra / Mathematics / Boolean algebra

Bit-Precise Reasoning with Affine Functions Neil Kettle and Andy King∗ Portcullis Computer Security Limited, Pinner, HA5 2EX, UK Abstract The class of affine Boolean functions is rich enough to express constant bits an

Add to Reading List

Source URL: www.digit-labs.org

Language: English - Date: 2008-06-09 08:21:20
87Cryptographic protocols / IEEE 802.11 / Pseudorandom number generators / Wired Equivalent Privacy / Fluhrer /  Mantin and Shamir attack / RC4 / Related-key attack / Initialization vector / Stream cipher / Cryptography / Wireless networking / Computer network security

AT&T Labs Technical Report TD-4ZCPZZ Using the Fluhrer, Mantin, and Shamir Attack to Break WEP Revision 2

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2004-07-14 23:06:25
88Cryptographic software / IEEE P1619 / Block cipher modes of operation / Symmetric-key algorithm / Block cipher / Advanced Encryption Standard / Key / Initialization vector / NSA Suite B Cryptography / Cryptography / Disk encryption / Key management

DataTraveler[removed]DT5000) and DataTraveler[removed]DT6000) Ultimate Security in a USB Flash Drive Submitted by SPYRUS, Inc.

Add to Reading List

Source URL: legacy.kingston.com

Language: English - Date: 2011-07-19 15:33:31
89Cryptographic software / Cryptographic protocols / Internet protocols / Secure communication / RC4 / Stream cipher / Initialization vector / Transport Layer Security / Symmetric-key algorithm / Cryptography / Software / Computing

The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [removed] Abstract. In this report, we point out a serious security flaw in Microsoft Word and Excel. T

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 07:26:49
90Technology / Computer network security / Fortinet / Cyberoam / SVM / Electronics / Cisco Systems / WatchGuard / Support vector machine / Content-control software / Deep packet inspection / Computing

Next Generation Firewall (NGFW) Security Value MapTM Cisco (2) Cisco[removed]%

Add to Reading List

Source URL: www.watchguard.com

Language: English - Date: 2014-09-23 12:53:13
UPDATE