Resultados da pesquisa
Ir para navegação
Ir para pesquisar
- This work presents concepts of cryptography, hash function, digital signature and Public1 kB (148 palavras) - 14h32min de 17 de abril de 2012
- ...as firewall and especially an intrusion detection system (IDS) concepts of cryptography, summary function, digital signature and public key, and not least of versi2 kB (398 palavras) - 14h20min de 9 de março de 2015
- ...key''. A device that wants to communicate only with a trusted device can [[cryptography|cryptographically]] [[authentication|authenticate]] the identity of the oth Bluetooth implements [[authentication]] and [[key (cryptography)|key]] derivation with custom algorithms based on the [[SAFER+]] block ciph20 kB (2 987 palavras) - 11h41min de 9 de maio de 2007
- ;Public key: The publicly available and distributed key used in public key cryptography systems. ;Public key cryptography: A generic term for all public key algorithms. PKC uses a pair of numeric "57 kB (9 293 palavras) - 18h16min de 28 de março de 2007
- # Enable public key cryptography. # with symmetric key cryptography.96 kB (14 078 palavras) - 17h31min de 6 de julho de 2015