Keyoxide: verifying online identity with cryptography
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 542 | |
Author | ||
License | CC Attribution 2.0 Belgium: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/61554 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Software developerIdentity managementCryptographyInternetworkingProjective planeRight angleFormal verificationIdentity managementCryptographyAsynchronous Transfer ModeIdentical particlesFigurate numberKey (cryptography)Link (knot theory)InternetworkingProfil (magazine)Matrix (mathematics)Basis <Mathematik>NumberElectronic visual displayIdentifiabilityWeb pageContent (media)Server (computing)Revision controlService (economics)Domain nameQuicksortString (computer science)Point (geometry)SoftwareMessage passingInstance (computer science)Public-key cryptographyMereologyValidity (statistics)Touch typingComputer animation
07:29
User profileFormal verificationIdentity managementElectronic signatureMobile appWebsiteClient (computing)Personal digital assistantConvex hullBroadcast programmingCASE <Informatik>Source codeFreewareCodeMatrix (mathematics)FreewareComputer configurationIdentical particlesTask (computing)CASE <Informatik>Link (knot theory)Client (computing)WebsiteFigurate numberFormal verificationComputing platformWeb 2.0Server (computing)Key (cryptography)Directory serviceMobile appProfil (magazine)Distribution (mathematics)Field (computer science)Projective planeFront and back endsDifferent (Kate Ryan album)Software developerPresentation of a groupElectronic mailing listSoftware testingService (economics)Public-key cryptographySymmetric-key algorithmOpen sourceSign (mathematics)Right angleTouch typingData storage deviceIdentity managementProcess (computing)Functional (mathematics)Asynchronous Transfer ModeComputer animation
14:52
Program flowchart
Transcript: English(auto-generated)