×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [bob computes]
Home >
bob computes
Cryptography
1.600 views
Software Security Technologies Richard Sinn Principal Architect / Security Architect, Yahoo, Inc Lecturer, SJSU.
221 views
b
806 views
13
117 views
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
212 views
Hashing Sandy Kutin CSPP 532 7/10/01. Cryptographic Protocols zWhat is a cryptographic protocol? zExample: Alice sends Bob a message M y1. Alice generates.
215 views
Public Key Encryption
50 views
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
215 views
1 Hello World and Welcome to The simple crypt Key=23 _r{{x7 @xe{s7 vys7@r {txzr7c x7Cr 7d~zg{r 7tengc Private-key Cryptography.
216 views
Hashing
30 views