Crypto and Privacy Village - Towards Usable Dining Cryptographer Networks with Howl
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 335 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48553 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
DEF CON 27182 / 335
8
9
12
14
32
38
41
58
60
61
72
75
83
87
92
96
108
115
128
132
143
152
158
159
191
193
218
230
268
271
273
276
278
295
310
320
321
335
00:00
CryptographyUsability
01:05
Information privacyThermodynamisches SystemChainBlock (periodic table)Associative propertyScalability
01:37
Link (knot theory)HTTP cookiePlastikkarteConnected spaceGoogolSurface of revolutionInfinite conjugacy class propertyTrailInternetworkingInformation privacyMetadataDigital signalThermodynamisches System
02:04
Information privacy
02:22
Observational study
02:41
MereologyCryptographyComputer networkHypothesisLocal Group
03:28
NumberWeb pageLimit (category theory)
03:50
Proxy serverBroadcasting (networking)Exclusive orFunction (mathematics)
05:27
Dew pointProxy server
06:10
CollisionServer (computing)Band matrixThermodynamisches System
06:41
AlgorithmScheduling (computing)Division (mathematics)Vector spaceNumbering schemeExclusive orMessage passing
07:28
Gibbs-samplingCommunications protocolSimilarity (geometry)Exclusive orServer (computing)Client (computing)Message passingInformation privacyMilitary operationScale (map)Process (computing)InformationComponent-based software engineeringComputer networkTraverse (surveying)Vertex (graph theory)Type theoryRoot
10:32
BefehlsprozessorIntelThermodynamisches SystemCodeIntegrated development environment
11:07
IntelHash functionBefehlsprozessorCodeKey (cryptography)Personal digital assistantData managementDigital rights managementPoint cloudDigital signalRevision control
11:29
outputComputer networkForceCodeRevision controlClient (computing)
11:55
ComputerRule of inferenceCommunications protocolDenial-of-service attackInformation privacyIntelComputer hardwareComputer networkConsistency
12:57
Personal digital assistantDatabase transactionBroadcasting (networking)TwitterSocial software
15:37
Twitter
17:40
Component-based software engineeringMessage passingComputer networkTraverse (surveying)Exclusive orGibbs-samplingCommunications protocolSimilarity (geometry)Server (computing)Client (computing)Information privacyMilitary operationScheduling (computing)AlgorithmVector spaceDivision (mathematics)Numbering schemeCollisionBand matrixThermodynamisches SystemEquals signProxy serverBroadcasting (networking)Function (mathematics)
18:09
CollisionServer (computing)Band matrixThermodynamisches SystemExclusive orVector spaceAlgorithmScheduling (computing)Division (mathematics)Numbering schemeMessage passing