Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Meditaciones 170
- Society & social sciences 161
- Biografa 132
- TomÆs de Aquino 132
- Comentarios 124
- Historia 105
- Educación pedagogía 93
- Església Catòlica 91
- Jesucristo- 90
- Obres anteriors al 1800 75
- Biblia 71
- Tratados y manuales 71
- Història 70
- Espiritualidad 58
- Ascetismo 57
- Teología dogmática 54
- Formaciðn 52
- Teologa dogmÆtica- 52
- Crtica e interpretaciðn 50
- Bíblia 43
- Historia / General 43
- Humanities 43
- Litúrgia 41
- Sermones 41
- Teologia 41
- Teologa dogmÆtica 40
- Vida Cristiana 39
- Mara 38
- Teologia moral 35
- Catequesis- 34
-
5221Publicado 2011Tabla de Contenidos: “…Canals de comercialització en AE; 2.3. Canals de Distribució de productes Agroecològics: Circuits Curts de Comercialització; 3. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Universidad Loyola - Universidad Loyola Granada)Acceso restringido con credenciales UPSA
Libro electrónico -
5222por Chandra, PraphulTabla de Contenidos: “…; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS…”
Publicado 2005
Libro electrónico -
5223Publicado 2023Tabla de Contenidos: “…Secret key ciphers -- Advanced Encryption Standard -- Data Encryption Standard -- How AES works -- Encrypting and decrypting using AES -- Summary -- Chapter 4 : Asymmetric Cryptography -- Foundational mathematics -- Asymmetric cryptography -- Public and private keys -- Asymmetric cryptography algorithms -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Integrated encryption scheme -- Introducing RSA -- Encrypting and decrypting with RSA -- Introducing ECC -- Mathematics behind ECC -- Point addition -- Point doubling -- Point multiplication -- The discrete logarithm problem -- Generating keys with ECC -- Digital signatures -- RSA digital signature algorithms -- Generating RSA digital signatures -- The elliptic curve digital signature algorithm -- Generating ECDSA digital signatures -- Different types of digital signatures -- Blind signatures -- Multisignatures -- Threshold signatures -- Aggregate signatures -- Ring signatures -- Cryptographic constructs and blockchain technology -- Homomorphic encryption -- Secret sharing -- Commitment schemes -- Zero-knowledge proofs -- zk-SNARKs -- zk-STARKs -- Zero-knowledge range proofs -- Encoding schemes -- Base64 -- base58 -- Verifiable random functions -- Summary -- Chapter 5 : Consensus Algorithms -- Introducing consensus -- Fault tolerance -- FLP impossibility -- Analysis and design -- Model -- Processes -- Timing assumptions -- Classification -- Algorithms -- CFT algorithms -- Paxos -- Raft -- BFT algorithms -- Practical Byzantine Fault Tolerance -- Istanbul Byzantine Fault Tolerance -- Tendermint -- Nakamoto consensus -- Variants of PoW -- HotStuff -- Choosing an algorithm -- Finality -- Speed, performance, and scalability -- Summary -- Chapter 6 : Bitcoin Architecture -- Introducing Bitcoin -- Cryptographic keys -- Private keys in Bitcoin -- Public keys in Bitcoin -- Addresses…”
Libro electrónico -
5224
-
5225
-
5226
-
5227
-
5228
-
5229
-
5230
-
5231
-
5232
-
5233
-
5234
-
5235
-
5236
-
5237
-
5238
-
5239
-
5240