Function key

Results: 1153



#Item
11The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
12Efficient Device-Independent Quantum Key Distribution⋆ Esther H¨ anggi1 , Renato Renner2 , and Stefan Wolf1 1 2

Efficient Device-Independent Quantum Key Distribution⋆ Esther H¨ anggi1 , Renato Renner2 , and Stefan Wolf1 1 2

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2013-02-20 10:42:48
13Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Catena: A Memory-Consuming Password-Scrambling Framework Christian Forler⋆ , Stefan Lucks, and Jakob Wenzel Bauhaus-Universit¨ at Weimar, Germany {Christian.Forler, Stefan.Lucks, Jakob.Wenzel}@uni-weimar.de

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 04:25:27
14Aggregate Addresses in CryptoNote: Towards Efficient Privacy Bytecoin Team September 8, Introduction

Aggregate Addresses in CryptoNote: Towards Efficient Privacy Bytecoin Team September 8, Introduction

Add to Reading List

Source URL: bytecoin.org

Language: English - Date: 2015-09-08 14:06:44
15Master of Science in Corporate Communication  Corporate Communication Goals and Contents Corporate communication is today considered a key management function. It is about managing relationships with the

Master of Science in Corporate Communication Corporate Communication Goals and Contents Corporate communication is today considered a key management function. It is about managing relationships with the

Add to Reading List

Source URL: www.mcc.usi.ch

Language: English - Date: 2011-04-16 15:42:25
16l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:31
17The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: www.iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
18Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Cache-Timing Attack Against a Password-based Key Derivation Function Advisor(s): Raphael Spreitzer and Daniel Gruss Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Au

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
19Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-30 18:17:59
20HP Prime AP Calculus Summer Institute  Materials by Mark Howell Version 1.1, Revised

HP Prime AP Calculus Summer Institute Materials by Mark Howell Version 1.1, Revised

Add to Reading List

Source URL: www.hp-prime.de

Language: English - Date: 2015-08-27 03:58:21