Wallet Security
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | ||
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/39190 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
Semiconductor memoryInformation securityMusical ensembleInformation securityComputer animation
00:31
Information securityTelecommunicationChaos (cosmogony)Proof theoryContext awarenessChainCommunications protocolBlock (periodic table)CryptographyComputer virusInformation securityText editorBitComputer scienceSoftwareInformation technology consultingChainProjective planeRevision controlField (computer science)Point (geometry)Electronic mailing listBlock (periodic table)BlogDegree (graph theory)Lecture/ConferenceComputer animation
02:22
Database transactionKey (cryptography)ChainBlock (periodic table)Computer networkAddress spaceSign (mathematics)Term (mathematics)Parameter (computer programming)View (database)AlgorithmDatabase transactionBroadcasting (networking)Public-key cryptographyElectronic signatureAddress spaceSign (mathematics)SoftwareSheaf (mathematics)Group actionChainPoint (geometry)WaveMixed realityBlock (periodic table)BlogGame controllerEnterprise architectureComputer animation
03:53
AlgorithmEllipseElectronic signatureCurveTime evolutionModulo (jargon)Diskreter LogarithmusRSA (algorithm)Key (cryptography)Point (geometry)AdditionMultiplicationScalar fieldReverse engineeringFunction (mathematics)Hash functionSign (mathematics)ComputerFormal verificationSoftware testingChainAlgorithmElliptic curveOrder (biology)Category of beingWell-formed formulaBitPower (physics)Maxima and minimaModulo (jargon)ResultantInverse functionNumberEllipseRevision controlPublic-key cryptographyOperator (mathematics)Parameter (computer programming)CASE <Informatik>Electronic signatureInformation securityNumbering schemeAdditionPoint (geometry)SchlüsselverteilungHash functionDiskreter LogarithmusKey (cryptography)Element (mathematics)CurveRSA (algorithm)Multiplication signMessage passingInverse elementNoise (electronics)Data analysisDigitizingEquivalence relationFunctional (mathematics)Line (geometry)CollineationMultiplicationElectronic visual displayEmpirical distribution functionQuery languageGoodness of fitFamilyDiscrete groupHand fanSet (mathematics)WordOnline helpTournament (medieval)View (database)Endliche ModelltheorieDifferent (Kate Ryan album)NeuroinformatikFlagStandard deviationForestDemosceneComputer animation
11:30
SoftwareType theoryPublic-key cryptographyDifferent (Kate Ryan album)Computer animation
11:58
Type theorySoftwareServer (computing)LaptopControl flowKey (cryptography)Computer hardwareToken ringBackupModule (mathematics)Data storage deviceImplementationComputer hardwareImplementationSoftwareType theoryDatabase transactionRandom number generationSoftware bugRootElectronic signatureFirmwareLaptopControl flowData storage deviceEncryptionModule (mathematics)PlastikkarteBootingPasswordKey (cryptography)MiniDiscNeuroinformatikMalwareSoftware protection dongleSmartphoneGame controllerData managementNatural numberGame theoryDescriptive statisticsWindowElectric generatorGroup actionProjective planeVirtual machineElectronic visual displayServer (computing)Vector potentialWordShape (magazine)Electronic mailing listScripting languageEndliche ModelltheorieNP-hardTablet computer1 (number)Computer animation
16:17
PlastikkarteComputer hardwareKey (cryptography)Module (mathematics)ImplementationServer (computing)Information securityLaptopData storage deviceComputer networkMalwareComplete metric spaceSource codePlastikkartePlug-in (computing)Computer hardwareSoftwareWindowEmailServer (computing)Data storage deviceKey (cryptography)MalwareNatural numberSeries (mathematics)Virtual machineLink (knot theory)Neighbourhood (graph theory)LaptopModule (mathematics)Service (economics)Lecture/ConferenceComputer animation
17:29
Computer networkMalwareComputer hardwareNumberKey (cryptography)CollisionDeterminantChainNumberCASE <Informatik>NeuroinformatikBlock (periodic table)BlogPredictabilityElectronic signatureRandomizationWeb browserLecture/ConferenceComputer animation
18:43
Computer networkNumberMalwareComputer hardwareKey (cryptography)CollisionRandom numberElectric generatorCryptographyBackdoor (computing)Ring (mathematics)ChainDatabase transactionBlock (periodic table)NumberTablet computerGoogle Street ViewCryptographyMathematicsNatural numberOrder (biology)IntelChainParameter (computer programming)Factory (trading post)Point (geometry)Spherical capView (database)Key (cryptography)NeuroinformatikArchaeological field surveyService (economics)TwitterPort scanner1 (number)AlgorithmElectric generatorDuality (mathematics)Database transactionRandom number generationComputer fileBackdoor (computing)Multiplication signLecture/ConferenceComputer animation
20:55
Positional notationTerm (mathematics)NumberPoint (geometry)Logical constantRandom numberAxiom of choiceRing (mathematics)Electronic signatureFunction (mathematics)Computer programmingShape (magazine)Elliptic curveOrder (biology)Function (mathematics)Electric generatorWell-formed formulaFunctional (mathematics)Line (geometry)NumberRandom number generationReal numberPublic-key cryptographyElectronic signatureRandomizationPoint (geometry)NeuroinformatikBackdoor (computing)Classical physics2 (number)DampingData managementMathematicsNatural numberGateway (telecommunications)ChainEllipseInternetworkingCASE <Informatik>Roundness (object)BlogPosition operatorLecture/ConferenceComputer animation
26:09
Database transactionChainCommunications protocolBlock (periodic table)Database transactionInternetworkingBackdoor (computing)MathematicsChainBlock (periodic table)Computer animationXML
26:49
Database transactionChainCommunications protocolBlock (periodic table)Key (cryptography)Order (biology)Phase transitionPublic-key cryptographyElectronic signatureKey (cryptography)NeuroinformatikHacker (term)XMLComputer animation
27:24
DeterminismKey (cryptography)Database transactionIndependence (probability theory)ChainSimilarity (geometry)Block (periodic table)Communications protocolCategory of beingLimit (category theory)AlgorithmDatabase transactionPublic-key cryptographyIndependence (probability theory)Electronic signaturePoint (geometry)Communications protocolData miningKey (cryptography)Different (Kate Ryan album)Backdoor (computing)CurveMultiplication signStandard deviationMathematicsExpert systemParameter (computer programming)CASE <Informatik>Musical ensembleInteractive televisionObservational studyElectronic mailing listPoint cloudNeuroinformatikBlock (periodic table)Lecture/ConferenceComputer animation
29:22
Database transactionKey (cryptography)Mathematical analysisDatabase transactionRandom number generationNormal (geometry)Identical particlesKey (cryptography)Computer animation
29:49
Database transactionKey (cryptography)Mathematical analysisIntegrated development environmentElectronic signatureCartesian coordinate systemComputer hardwareSoftwareKey (cryptography)Contrast (vision)Computer animation
30:26
FingerprintAlgorithmDeterminismElectronic signatureLeakPerfect groupKey (cryptography)DiagramCurveEllipseCryptosystemIndependent set (graph theory)NumberSign (mathematics)Streaming media1 (number)Elektronisches MarketingComputer animationLecture/Conference
31:04
Derivation (linguistics)BitLeakPublic-key cryptographyKey (cryptography)Observational studyInformationNumbering schemeGame controllerLecture/Conference
31:44
CodeBitSource codeComputer hardwareSoftwareDatabase transactionExterior algebraPoint (geometry)Lecture/Conference
32:35
Random number generationPoint (geometry)MereologySlide ruleNumberPublic-key cryptographyNumbering schemeCommunications protocolMultiplication signStandard deviationMessage passingData managementLogarithmASCIIElectronic GovernmentTwitterLecture/Conference
34:01
2 (number)Vector spaceCASE <Informatik>AuthorizationLecture/Conference
34:32
CryptographySource codeForm (programming)InternetworkingModal logicLecture/Conference
34:59
FingerprintAlgorithmDeterminismElectronic signatureDiscrete groupLeakPerfect groupKey (cryptography)DiagramCurveEllipseCryptographyIndependent set (graph theory)Semiconductor memoryCartesian closed categoryKey (cryptography)Musical ensembleLecture/ConferenceComputer animation
Transcript: Englisch(auto-generated)