Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ! [[SAS System|SAS OLAP Server]] ! [[SAS System|SAS OLAP Server]] ...
    30 KB (3,664 words) - 06:15, 21 February 2025
  • ...last=Goth|first=G.|date=2003|title=Addressing the monoculture|journal=IEEE Security & Privacy|volume=1|issue=6|pages=8–10|doi=10.1109/msecp.2003.1253561|s2cid= ...o the Internet are running versions of the [[Microsoft Windows]] operating system, many of which are vulnerable to the same attacks. ...
    11 KB (1,703 words) - 03:15, 22 January 2025
  • {{Short description|Security vulnerability in Diffie–Hellman key exchange}} ...20220224011050/https://www.wsj.com/articles/new-computer-bug-exposes-broad-security-flaws-1432076565|url-status=live}}</ref> ...
    12 KB (1,625 words) - 17:17, 5 July 2024
  • | operating system = [[Windows 10]], [[Linux]] ...chnorr signature|Schnorr]]), and offers about 128 [[Security level|bits of security]].<ref name="4q">{{cite journal |last1=Costello |first1=Craig |last2=Longa ...
    7 KB (1,002 words) - 03:52, 7 July 2023
  • ==Security== ...could be detected by users, whose time-stamps are relatively comparable by system design. ...
    13 KB (1,730 words) - 04:20, 21 August 2023
  • {{Short description|System adjusting the output of electric generators}} ...d loads; generators must be controlled to maintain stable operation of the system.]] ...
    6 KB (865 words) - 23:30, 23 December 2022
  • ...cka (June 26, 2012). [http://www.darkreading.com/insider-threat/167801100/security/news/240002768/new-forensics-method-may-nab-insider-thieves.html "New Foren ...al_Investigation" /><ref>Nishide, T., Miyazaki, S., & Sakurai, K. (2012). "Security Analysis of Offline E-cash Systems with Malicious Insider". Journal of Wire ...
    8 KB (1,082 words) - 16:57, 26 January 2023
  • {{Short description|Manufacturer of hotel security systems}} | industry = Security / hotel electronic door locks, in-room safes and energy management systems ...
    16 KB (2,225 words) - 20:43, 22 December 2024
  • ...perations of the interconnected [[Electric power transmission|transmission system]]. ...o maintain the integrity and stability of the transmission or distribution system as well as the power quality".<ref>Thermal Working Group .(2004). Ancillary ...
    13 KB (1,769 words) - 23:26, 20 January 2025
  • {{Short description|System allowing searching of encrypted documents}} ...itle=Proceedings of the 13th ACM conference on Computer and communications security |chapter=Searchable symmetric encryption |date=2006-10-30|chapter-url=https ...
    17 KB (2,541 words) - 04:06, 22 July 2024
  • ...ulator]]) MEMS([[Micro Electro Mechanical Systems|Micro electro-mechanical system]]) technology. It has been developed in the last decade by the [[Technion – == Operating principle == ...
    17 KB (2,490 words) - 16:46, 11 June 2024
  • ...d for by someone, who could be one of the cryptographers or the [[National Security Agency]] (NSA). The cryptographers respect each other's right to make an a ...c underlying ideas is his.<ref>{{cite journal | author=David Chaum | title=Security without identification: transaction systems to make big brother obsolete | ...
    16 KB (2,357 words) - 18:15, 8 May 2024
  • ...and is the [[List of largest power stations#Photovoltaic|second largest]] operating CPV facility in the world.<ref name="cpvlist">{{Cite web |url=http://cpvcon ...system|grid-connected]] 630&nbsp;kW [[inverter]].<ref name="lecap" /> Each system supports 12 CX-M500 modules which are each rated to produce 2450&nbsp;[[Wat ...
    12 KB (1,604 words) - 07:35, 30 October 2024
  • .../20130331041411/http://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf |archive-date=2013-03-31 |website=[[Intel Corporatio ...www.via.com.tw/en/initiatives/padlock/hardware.jsp#aes | title=VIA Padlock Security Engine | publisher=VIA | access-date=2011-11-14 | archive-date=2011-05-15 | ...
    26 KB (3,426 words) - 11:47, 22 February 2025
  • ...irst4=P.|date=2016-01-01|title=Lyra2: efficient password hashing with high security against time-memory trade-offs|journal=IEEE Transactions on Computers|volum * Provides higher security against time-memory trade-offs. ...
    18 KB (2,642 words) - 02:09, 24 December 2024
  • ...act, 1963)</ref> However, the card could be forged easily as there was no security features. It could also be damaged easily due to being made with paper. ...ราชบัญญัติบัตรประจำตัวประชาชน พ.ศ. ๒๕๒๖</ref> Since then, the card issuing system was subsequently implemented nationwide. However, the information provided ...
    17 KB (1,854 words) - 03:27, 5 December 2024
  • ...and [[Kenwood Corporation]] as an advanced [[digital modulation|digital]] system using [[frequency-shift keying|FSK]] modulation that supports [[encryption| NXDN is implemented by Icom in their IDAS system <ref>{{Cite web|url=http://www.icom.co.jp/world/idas/index.html|title=Icom ...
    14 KB (1,896 words) - 19:32, 5 February 2025
  • ...key would allow end users to [[flash memory|flash]] their own [[operating system]]s onto the device without having to use any special software. Moody used t |title=Schneier on Security: Texas Instruments Signing Keys Broken ...
    10 KB (1,436 words) - 00:37, 14 February 2025
  • * [[Dynamical system|Dynamic Systems]] * Mathematical Modeling of [[Biological system|Biological Systems]] ...
    19 KB (2,486 words) - 06:26, 1 March 2025
  • ...lue added tax|VAT]], income tax in the petroleum sector, employers' social security contributions and tax on "ordinary income" for persons. Most [[direct taxes ...vernment are VAT, tax on income in the petroleum sector, employers' social security contributions, and tax on "ordinary income" from individual taxpayers, whil ...
    46 KB (6,574 words) - 05:01, 29 October 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)