"Plaintext" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 16 of 24 - About 235 Essays
  • Powerful Essays

    Computer

    • 17984 Words
    • 72 Pages

    Cisco CCNA Security Notes (640-553) Contents Contents ....................................................................................................................................................... 1 Introduction .................................................................................................................................................. 3 Cisco Security Management Tools ..............................................................................................

    Premium IP address Security

    • 17984 Words
    • 72 Pages
    Powerful Essays
  • Good Essays

    Prime Number and Mod

    • 13451 Words
    • 54 Pages

    Section 4.1 Divisibility and Modular Arithmetic 87 CHAPTER 4 Number Theory and Cryptography SECTION 4.1 Divisibility and Modular Arithmetic 2. a) 1 | a since a = 1 · a. b) a | 0 since 0 = a · 0. 4. Suppose a | b ‚ so that b = at for some t ‚ and b | c‚ so that c = bs for some s. Then substituting the first equation into the second‚ we obtain c = (at)s = a(ts). This means that a | c‚ as desired. 6. Under the hypotheses‚ we have c = as and d = bt for some s and t . Multiplying

    Premium Prime number Integer Binary numeral system

    • 13451 Words
    • 54 Pages
    Good Essays
  • Good Essays

    Phantom Anonymity Protocol

    • 36549 Words
    • 147 Pages

    White Paper: Generic‚ Decentralized‚ Unstoppable Anonymity: The Phantom Protocol Author: Magnus Bråding Generic‚ Decentralized‚ Unstoppable Anonymity: The Phantom Protocol Version: 0.82 2011-05-24 1(68) White Paper: Generic‚ Decentralized‚ Unstoppable Anonymity: The Phantom Protocol Author: Magnus Bråding 1. Abstract Recent years‚ and especially this past year‚ have seen a notable upswing in developments toward anti-online privacy around the world‚ primarily in the form

    Premium Internet Overlay network IP address

    • 36549 Words
    • 147 Pages
    Good Essays
  • Powerful Essays

    A preliminary version of this paper appears in the proceedings of Eurocrypt 2013. This is the full version. Message-Locked Encryption and Secure Deduplication Mihir Bellare1 Sriram Keelveedhi2 Thomas Ristenpart3 March 2013 Abstract We formalize a new cryptographic primitive‚ Message-Locked Encryption (MLE)‚ where the key under which encryption and decryption are performed is itself derived from the message. MLE provides a way to achieve secure deduplication (space-efficient secure outsourced

    Premium Cryptography Key Encryption

    • 18838 Words
    • 76 Pages
    Powerful Essays
  • Good Essays

    Application Software Trends

    • 2584 Words
    • 11 Pages

    APPLICATION SOFTWARE TRENDS APPLICATION SOFTWARE ( An application is a program or group of programs designed for end users. Application software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includesoperating systems‚ compilers‚ and utilities for managing computer resources. In contrast‚ applications software (also called end-user programs)

    Premium Microsoft Microsoft Office

    • 2584 Words
    • 11 Pages
    Good Essays
  • Good Essays

    CHAPTER I THE PROBLEM AND ITS BACKGROUND Introduction A growing amount of economic activity is taking place on the Internet. As a result‚ electronic payment displays a boom although paper based payment methods still dominate the payment system. Electronic Payment or on-line payment is a form of financial transactions that are made without the use of paper documents such as cheques or notes (“A consumer’s guide of electronic payments”‚ 2001). At present‚ business organizations‚ consumers and

    Premium World Wide Web Credit card Payment systems

    • 3202 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Journal of Theoretical and Applied Information Technology © 2005 - 2009 JATIT. All rights reserved. www.jatit.org BUSINESS INTELLIGENCE: CONCEPTS‚ COMPONENTS‚ TECHNIQUES AND BENEFITS JAYANTHI RANJAN Institute of Management Technology‚ Ghaziabad‚ Uttar Pradesh‚ India Email: jranjan@imt.edu ABSTRACT For companies maintaining direct contact with large numbers of customers‚ however‚ a growing number channel-oriented applications (e.g. e-commerce support‚ call center support) create a new data

    Premium Business intelligence

    • 5951 Words
    • 24 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Which if the following IPv6 address type is assigned to multiple interfaces but packets will only be delivered to one? a. Multicast b. Anycast c. Unicast d. Broadcast Grade: 1 User Responses: b.Anycast Feedback: a.An anycast address is assigned to a group of interfaces on multiple nodes. Packets are delivered to the “first” interface only. 2. Routers operate at which OSI layer? a. Physical b. Transport c. Network d. Session Grade: 1 User Responses:

    Premium IP address

    • 15799 Words
    • 64 Pages
    Satisfactory Essays
  • Powerful Essays

    E Wallet

    • 3634 Words
    • 15 Pages

    International Journal of UbiComp (IJU)‚ Vol.1‚ No.4‚ October 2010 MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM Majid Taghiloo1‚ Mohammad Ali Agheli 2‚ and Mohammad Reza Rezaeinezhad3 1 Amnafzar Department of Pishgaman Kavir Yazd‚ Tehran‚ Iran mtaghiloo@amnafzar.net 2 Amnafzar Department of Pishgaman Kavir Yazd‚ Yazd‚ Iran agheli@amnafzar.net 3 Pishgaman Kavir Yazd‚ Yazd‚ Iran rezaei@pishgaman.com ABSTRACT E-commerce in today’s conditions has the highest dependence on network

    Premium Wireless Transaction processing Electronic commerce

    • 3634 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    UNIX‚ Linux‚ and Windows Server Critique UNIX‚ Linux‚ and Windows Server Critique Administration Windows Server Advantages There are many administration advantages for Windows Servers. One aspect is domain operations which are an important resource available on the network through Window Server. Making Window Server a domain controller adds security and the ability to add local and group policies to the network (Garza‚ 2010). If Window Server is not promoted to the status

    Premium Unix Operating system Microsoft

    • 3411 Words
    • 14 Pages
    Better Essays
Page 1 13 14 15 16 17 18 19 20 24