|
Molotkov rep2 Combined Phase Time Encoding Method in Quantum Cryptography |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Revue des videos : - l'ensemble [ tous] - par mots clé [ tous] - par site [ tous] - le tagwall video [ voir] - Top bi-hebdo des videos [ Voir]
Molotkov rep2 Combined Phase Time Encoding Method in Quantum Cryptography Sur google, Par Chair of Quantum Informatics, CMC MSU Le [19-10-2008 03:22]
Description : Molotkov rep2 - Combined Phase-Time Encoding Method in Quantum Cryptography Chair of Quantum Informatics, CMC MSU 16 mn - 5 oct. 2007
"Combined Phase-Time Encoding Method in Quantum Cryptography". S. P. Kulik (1), A. P. Makkaveev (2), S. N. Molotkov (3), (4). 1. Phisical Department, Moscow State University, Moscow, Russia. 2. Institute Physics and Technology, Russian Academy of Sciences, Moscow, Russia. 3. Institute of Solid State Physics, Russian Academy of Sciences, Chernogolovka, Russia. 4. Computer Science Department, Moscow State University, Moscow, Russia. ----- International Symposium "Quantum informatics - 2007" (QI-2007). QI-2007 is the fourth specialized symposium on quantum informatics carried out in Russia. It is held by Institute of Physics and Technology - FTIAN (RAS) and Moscow State University (MSU), Chair of Quantum Informatics on the Faculty of Computational Mathematics and Cybernetics. For details, please, visit the homepage of the IQ-2007: http://qi.cs.msu.su/en/QI-2007/
Les mots clés SecuObs pour les videos : quantum Le mot clé Google pour cette video : cryptography Les articles de la revue de presse sur les mots clés : quantum Les éléments de la revue Twitter pour les mots clés : quantum
Les dernières videos pour le mot clé "cryptography" :
- MicroNugget What is Suite B Cryptography - Yuval Ishai The complexity of cryptography - Introduction to Public key Cryptography and Digital Signatures - Cryptography PPT - Gambling with Secrets Part 7 8 Diffie Hellman Key Exchange - Cryptography Network Security IIT - K N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER - COURSERA STANFORD UNIVERSITY CRYPTOGRAPHY COURSE 1 1 - Lec 20 MIT 6 042J Mathematics for Computer Science Fall 2010 - Cryptography lecture by Ms Rashmi Sharma
Les dernières videos du site "google" :
- OpenVPN 2008 - HITBSecConf2007 Malaysia KEYNOTE Mark Phiber Optik Abene The Rise - HITBSecConf2007 Malaysia Martin Johns Exploiting the Intranet With a Webpage - HITBSecConf2007 Malaysia Billy RiosNathan McFeters Slipping Past The Firewall - HITBSecConf2003 Malaysia Wong Chun Meng The value of computer forensics B2 - HITBSecConf2007 Malaysia Raffael Marty Insider Threat Visualization - HITBSecConf2003 Malaysia Simos Xenitellis Event driven system security T4 - HITBSecConf2007 Malaysia Andrea Barisani Daniele Bianco Injecting RDS TMC - HITBSecConf2003 Malaysia Meling Mudin Putting the Eye on IDS B3 - HITBSecConf2003 Malaysia The Last Stage of Delirium LSD Security Myths T1
Menu > Revue des videos : - l'ensemble [ tous] - par mots clé [ tous] - par site [ tous] - le tagwall video [ voir] - Top bi-hebdo des videos [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.191.75.173 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.191.75.173 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|