Results 51 to 60 of about 1,090 (96)
Performance tests of cryptographic algorithms [PDF]
Bakalářské práce se zabývá rozborem jednotlivých kryptografických algoritmů, které se využívají při zabezpečování komunikace. První část je věnována symetrickým kryptografickým algoritmům, asymetrickým kryptografickým algoritmům a hashovacím funkcím ...
Pospíšil, Karel
core
FinBook: literary content as digital commodity [PDF]
This short essay explains the significance of the FinBook intervention, and invites the reader to participate. We have associated each chapter within this book with a financial robot (FinBot), and created a market whereby book content will be traded with
Gianni, Rory +6 more
core
Transfer of Security Email Proxy into Embedded Device [PDF]
Bakalářská práce se zabývá analýzou embedded zařízení a operačních systémů pro tato zařízení za účelem portace proxy pro zabezpečení elektronické pošty na některé z těchto zařízení.
Richter, Jan
core
Secure Data Deduplication in Cloud Storage Services [PDF]
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core
Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled ...
Kevin Werbach, Nicolas Cornell
core +1 more source
A trajetória cypherpunk e suas práticas discursivas
O texto traz a análise de um tipo específico de ciberativismo denominado cypherpunk. Ele ganhou destaque mundial principalmente a partir das denuncias realizadas pelo Wikileaks, obtendo ainda mais força após as revelações de Edward Snowden, o ex-agente da inteligência dos Estados Unidos que divulgou detalhes sobre o sistema de vigilância massiva ...
openaire +1 more source
Blockchain Owns You : From Cypherpunk to Self-Sovereign Identity
©2022 The Rowman & Littlefield Publishing Group. All rights reserved. Please contact the publisher for permission to copy, distribute or reprint. ; fi=vertaisarvioitu|en=peerReviewed|
openaire +1 more source
Privacy in Mobile Agent Systems: Untraceability [PDF]
Agent based Internet environments are an interesting alternative to existing approaches of building software systems. The enabling feature of agents is that they allow software development based on the abstraction (a "metaphor") of elements of the real ...
LESZCZYNA RAFAL
core
The Political Meaning of Hacktivism [PDF]
Philosopher-kings or Fawkes masks?
Gorham, Ashley
core
From Cypherpunks to Congress: A Historical Analysis of the Development, Uses, and Regulatory Landscape of Cryptocurrencies [PDF]
As cryptocurrencies have begun to proliferate through the economy policymakers are asking questions of where they came from, how do they work, what they are used for and how should we regulate the market.
Moore, Andrew
core +1 more source

