Results 51 to 60 of about 1,090 (96)

Performance tests of cryptographic algorithms [PDF]

open access: yes, 2009
Bakalářské práce se zabývá rozborem jednotlivých kryptografických algoritmů, které se využívají při zabezpečování komunikace. První část je věnována symetrickým kryptografickým algoritmům, asymetrickým kryptografickým algoritmům a hashovacím funkcím ...
Pospíšil, Karel
core  

FinBook: literary content as digital commodity [PDF]

open access: yes, 2017
This short essay explains the significance of the FinBook intervention, and invites the reader to participate. We have associated each chapter within this book with a financial robot (FinBot), and created a market whereby book content will be traded with
Gianni, Rory   +6 more
core  

Transfer of Security Email Proxy into Embedded Device [PDF]

open access: yes, 2008
Bakalářská práce se zabývá analýzou embedded zařízení a operačních systémů pro tato zařízení za účelem portace proxy pro zabezpečení elektronické pošty na některé z těchto zařízení.
Richter, Jan
core  

Secure Data Deduplication in Cloud Storage Services [PDF]

open access: yes
Cloudová úložiště se poslední dobou stala výhodnou alternativou k jiným typům úložišť, jejich provozovatelé se však potýkají s problémem jak skloubit optimalizaci a ochranu uložených dat. Pro zajištění utajenosti svých dat by klienti úložiště preferovali
Staněk Jan
core  

Contracts Ex Machina [PDF]

open access: yes, 2017
Smart contracts are self-executing digital transactions using decentralized cryptographic mechanisms for enforcement. They were theorized more than twenty years ago, but the recent development of Bitcoin and blockchain technologies has rekindled ...
Kevin Werbach, Nicolas Cornell
core   +1 more source

A trajetória cypherpunk e suas práticas discursivas

open access: yesRevista Eco-Pós, 2016
O texto traz a análise de um tipo específico de ciberativismo denominado cypherpunk. Ele  ganhou destaque mundial principalmente a partir das denuncias realizadas pelo Wikileaks, obtendo ainda mais força após as revelações de Edward Snowden, o ex-agente da inteligência dos Estados Unidos que divulgou detalhes sobre o sistema de vigilância massiva ...
openaire   +1 more source

Blockchain Owns You : From Cypherpunk to Self-Sovereign Identity

open access: yes, 2022
©2022 The Rowman & Littlefield Publishing Group. All rights reserved. Please contact the publisher for permission to copy, distribute or reprint. ; fi=vertaisarvioitu|en=peerReviewed|
openaire   +1 more source

Privacy in Mobile Agent Systems: Untraceability [PDF]

open access: yes, 2007
Agent based Internet environments are an interesting alternative to existing approaches of building software systems. The enabling feature of agents is that they allow software development based on the abstraction (a "metaphor") of elements of the real ...
LESZCZYNA RAFAL
core  

The Political Meaning of Hacktivism [PDF]

open access: yes, 2017
Philosopher-kings or Fawkes masks?
Gorham, Ashley
core  

From Cypherpunks to Congress: A Historical Analysis of the Development, Uses, and Regulatory Landscape of Cryptocurrencies [PDF]

open access: yes
As cryptocurrencies have begun to proliferate through the economy policymakers are asking questions of where they came from, how do they work, what they are used for and how should we regulate the market.
Moore, Andrew
core   +1 more source

Home - About - Disclaimer - Privacy