Cryptography
epub |eng | 2016-04-08 | Author:Jonathan LeBlanc & Tim Messerschmidt

// development error handler // will print stacktrace if (app.get('env') === 'development') { app.use(function(err, req, res) { console.log('error'); res.status(err.status || 500); res.render('error', { message: err.message, error: err }); }); } ...
( Category: Cybernetics May 17,2019 )
epub |eng | 2015-02-08 | Author:Swan, Melanie [Swan, Melanie]

Blockchain Genomics 2.0: Industrialized All-Human-Scale Sequencing Solution At one level, there could be blockchain-enabled services where genomic data is sequenced and made available to individuals by private key outside the ...
( Category: Cryptography May 10,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua

* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category: Cryptography May 9,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]

( Category: Cryptography May 7,2019 )
epub |eng | 2019-03-15 | Author:Will Button

Then we're going to use async and await to get the deployed version of our contract from the Ethereum network. So, let me break a async and await down for ...
( Category: Encryption May 6,2019 )
epub |eng | 2019-03-25 | Author:Salman A. Baset

Smart contract considerations As we mentioned, smart contracts are vital to business interaction between the participants of any blockchain network. As they essentially contain the rules and conditions under which ...
( Category: Cryptography May 5,2019 )
epub, pdf |eng | 2019-02-13 | Author:Arjuna Sky Kok

def fillPosts(self, posts): self.clearTweetsField() for post in posts: label_field = QtWidgets.QLabel(post) self.tweets_layout.addWidget(label_field) The same strategy is used in the two following methods. We clear the bookmark widgets from the bookmarks ...
( Category: Cryptography May 4,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye

parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category: Combinatorics April 5,2019 )
epub |eng | 2014-09-22 | Author:Josh Datko [Datko, Josh]

In the FPS_CryptoCape.ino file, this is accomplished by setting digital output 2 as an output and then pulling the line low. When a fingerprint is recognized, the pin is configured ...
( Category: Software Development April 4,2019 )
epub |eng | 2014-06-04 | Author:Phil Champagne [Champagne, Phil]

* * * Re: Stealing Coins Posted by knightmb, July 25, 2010, 07:34:42 PM * * * Very nice. *another reason why I love open source* As I understand it ...
( Category: Software Development March 23,2019 )
epub |eng | 2019-01-29 | Author:Peter Lipovyanov

DTube takes decentralized social media a step further. It is a video sharing and streaming platform, similar to YouTube, built as an application on the Steem blockchain. The principles it ...
( Category: Encryption March 11,2019 )
epub, pdf |eng | | Author:Abhinav Singh

Once the scan setting pop up appears, click on OK to proceed. After few moments, the attack will be launched and any successful crack will be reported by Fern. Bluetooth ...
( Category: Encryption April 23,2016 )
epub, pdf |eng | | Author:Song Y. Yan

(b) (c) 3.Use Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a) (b) (c) . 4.Use Pollard’s ρ method to find the discrete logarithms k such that (a) (b) . ...
( Category: Internet & Networking April 8,2016 )
epub |eng | 2014-05-02 | Author:Dawn Dunkerley

Travel Advisory Network-based intrusion systems also are not effective in monitoring encrypted communications, such as over a virtual private network (VPN). When an intrusion is detected, the system works in ...
( Category: Encryption February 4,2016 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra

Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category: Network Security December 13,2015 )