Real-time Data De-duplication using Locality-sensitive Hashing powered by Storm and Riak (Berlin Buzzwords 2014)
security slides
Erlang Concurrency
(a) Alice and Bob are back together. Today Alice wants to send Bob a message that is secret and also authenticated, so that Bob "knows" the message came.
EE579T/4 #1 Spring 2003 © 2000-2003, Richard A. Stanley WPI EE579T / CS525T Network Security 4: Authentication, PGP Prof. Richard A. Stanley.
Wifi Hacking
EE579T/3 #1 Spring 2005 © 2000-5 Richard A. Stanley EE579T / CS525T Network Security 3: Authentication, PGP Prof. Richard A. Stanley.
©1998-2001 ITU Electronic Commerce for Developing Countries (EC-DC). Page - 1 Security and Trust for E-commerce Alexander NTOKO, Project Manager, ITU Electronic.