Custom Crypto Policies by Examples
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 490 | |
Author | ||
License | CC Attribution 2.0 Belgium: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/47225 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
CryptographyAlgorithmInformation managementCryptographySoftware engineeringPrincipal idealLecture/Conference
00:41
CryptographyAdditionLecture/Conference
01:10
CryptanalysisEvoluteCryptographyTerm (mathematics)Communications protocolMathematicsAlgorithmLecture/Conference
02:04
Communications protocolMathematicsVirtual machineSet (mathematics)Configuration spaceLevel (video gaming)SoftwareDifferent (Kate Ryan album)AlgorithmLine (geometry)CryptographyWeb 2.0Lecture/Conference
03:52
Computer fileCore dumpLibrary (computing)Physical systemConfiguration spaceAsynchronous Transfer ModeMultiplication signBootingAlgorithmMultiplicationMathematicsLevel (video gaming)Cartesian coordinate systemSymmetric matrixParameter (computer programming)Transport Layer SecurityDefault (computer science)Information securityMatching (graph theory)CryptographyRevision controlOcean currentData managementFlow separationImplementationTelecommunicationLecture/Conference
09:37
DampingLevel (video gaming)CryptographyElectronic signatureParameter (computer programming)Computer fileConfiguration spaceLibrary (computing)Front and back endsLimit (category theory)Normal (geometry)Symmetric matrixLengthSchlüsselverteilungElectronic mailing listHash functionMaxima and minimaKey (cryptography)Revision controlGroup actionFile formatCASE <Informatik>AlgorithmModule (mathematics)MathematicsDifferent (Kate Ryan album)Lecture/Conference
14:22
Limit (category theory)Lecture/Conference
14:48
Key (cryptography)Public key certificateBitWebsiteRegular graphPressureCommunications protocolLibrary (computing)Electronic mailing listRevision controlFront and back endsTransport Layer SecurityGroup actionWeb browserSchlüsselverteilungAddress spaceConfiguration spaceLevel (video gaming)Multiplication signCartesian coordinate systemAlgorithmScripting languagePlanningComputer fileEncryptionElectric generatorComputer configurationError messageDampingCryptographyOrder (biology)Formal languageMultiplicationSelectivity (electronic)Ocean currentLecture/Conference
22:29
MultiplicationDampingSingle-precision floating-point formatFile formatCryptographyAlgorithmLevel (video gaming)Service (economics)Physical systemCASE <Informatik>Connected spaceClient (computing)System administratorServer (computing)Lecture/Conference
24:54
Point cloudOpen sourceFacebook
Transcript: English(auto-generated)