Bit data structures

User Electronic Signature

The User Electronic Signature (UES) is a bitfield with user-defined content in a Programmable logic device (PLD). It is usually used for the storage of the ID and/or version number of the PLD, suited for serial identification. Examples for PLD's with a UES are the industry standards GAL16V8 and GAL22V10. * v * t * e (Wikipedia).

Video thumbnail

Digital Signatures: Part 1

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Digital Signatures: Part 2

Fundamental concepts of Digital Signatures are discussed. ElGamal and Schnorr Digital Signature schemes are analyzed. Digital signature standard is presented.

From playlist Network Security

Video thumbnail

Signature Validation Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Testing Apple's Touch ID with Fake Fingerprints

How secure is Apple's Touch ID? We explain how it recognizes fingerprints, and then put it to the test by making fake fingers and fingerprints of our own. A German computer club claimed to have spoofed the security system last year, and we retrace their methods as well as experimenting wit

From playlist Hardware Reviews

Video thumbnail

27c3: Die gesamte Technik ist sicher (de)

Speakers: Dominik Oepen, Frank Morgner Possession and knowledge: Relay attacks on the new ID card For the new electronic identity card three different readers classes are specified, the simplest of which has already undergone some criticism. After the discussion about the security of the

From playlist 27C3: We come in peace

Video thumbnail

Beginning Graphic Design: Branding & Identity

In this video, you’ll learn the basics of using branding and identity in graphic design. Visit https://www.gcflearnfree.org/beginning-graphic-design/branding-and-identity/1/ for our text-based lesson. This video includes information on: • Visual identity • Logos • Color • Typography • Ima

From playlist Graphic Design

Video thumbnail

Enabling Practical Ubiquity

(November 20, 2009) Shwetak Patel, from the University of Washington, discusses the challenge and recent developments of researching ubiquitous homes while allowing people to be in their natural environment. Stanford University: http://www.stanford.edu/ Stanford Engineering Everywh

From playlist Lecture Collection | Human-Computer Interaction Seminar (2009-2010)

Video thumbnail

How to Send Digital Signatures without Paying for DocuSign

Want to sign and send documents online? Get your DigiSigner account here: https://bit.ly/getdigisigner DocuSign may be the best-known electronic signature service. But it also comes with a hefty price tag. In this video, Scott Friesen shows you why DigiSigner may be your better choice for

From playlist Productivity App Reviews for Entrepreneurs & Small Business

Video thumbnail

Protection Of Information Assets | CISA Training Videos

Certified Information System Auditor (CISA) Protection of Information Assets Objectives: • Understand and provide assurance that the enterprise’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets • Detail the

From playlist CISA Training Videos

Video thumbnail

26C3: Technik des neuen ePA 5/6

Clip 5/6 Speaker: Henryk Plötz Brave new eID world: PACE, TA/CA, RI, eID, younameit. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3510.en.html

From playlist 26C3: Here be dragons day 3

Video thumbnail

Using the e-Consent Framework in IU REDCap 01/14/2021

For the most recent version of this workshop, visit: https://youtu.be/wjuXENXmx3w Obtaining written consent is a crucial step for engaging participants in research, but managing paper forms can be a challenge. REDCap offers a user-friendly electronic method to obtain and manage participan

From playlist IU REDCap

Video thumbnail

How to Break PDF Security

PDF is the most widely used standard for office documents. Supported by many desktop applications, email gateways and web services solutions, are used in all sectors, including government, business and private fields. For protecting sensitive information, PDFs can be encrypted and digitall

From playlist Security

Video thumbnail

Mathematics in Cryptography II - Toni Bluher

2018 Program for Women and Mathematics Topic: Mathematics in Cryptography II Speaker: Toni Bluher Affiliation: National Security Agency Date: May 21, 2018 For more videos, please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Signatures - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

28C3: Electronic money: The road to Bitcoin and a glimpse forward (en)

For more information visit: http://bit.ly/28C3_information To download the video visit: http://bit.ly/28C3_videos Playlist 28C3: http://bit.ly/28C3_playlist Speaker: Peio Popov How the e-money systems can be made better The proposed talk provides a definition of the problem of c

From playlist 28C3: Behind Enemy Lines

Related pages