Found 206 presentations matching your search
Parallel and distributed computing
Introduction to Blockchain in Supply Chain Management Blockchain technology is revolutionizing suppl...
Jkuu
thank you
CYBER SECURITY, DIGITAL SIGNATURE, Private Key Public Key, Digital Signature Certificate, DIGITAL SI...
The "Introduction to Computer Network Security" presentation provides a comprehensive intr...
Emerging threats in cyber security anticipating and mitigating future risks
Computer engineering or computer science
network security unit-4
vDesk.works uses AI and machine learning to spot and stop threats in real time. The system keeps lea...
The topic comes under CRYPTOGRAPHY AND NETWORK SECURITY in Computer Science Engineering.
Security tests
a must read
The presentation include: -Diffie hellman key exchange algorithm -Primitive roots -Discrete logarit...
Discuss about SHA 512
This attack was made possible due to a programming vulnerability in OpenSSL libraries. The attack wa...
The fourth revision of the draft NIST SP 800-63-4 Digital Identity Guidelines is now open for public...
information security
Overview of Blockchain
ffffffffffffffffff
Eucledian Algorithm for GCD of Integers and Polynomials
Decentralized applications, or dApps, are software programs that run on a blockchain or peer-to-peer...
ntg