Help


[permalink] [id link]
+
Page "Public-key cryptography" ¶ 57
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Examples and asymmetric
Examples of asymmetric key algorithms not widely adopted include:
Examples of protocols using asymmetric key algorithms include:
Examples of asymmetric tops: anthracene ( C < sub > 14 </ sub > H < sub > 10 </ sub >), water ( H < sub > 2 </ sub > O ), nitrogen dioxide ( NO < sub > 2 </ sub >)
Examples where this is true include ADSL ( where the " A " stands for " asymmetric "), cable modems, cellular Internet access facilities ( e. g. 3G ) and satellite internet access ( e. g. ASTRA2Connect ).

Examples and key
Examples include calcium carbide, silicon carbide, tungsten carbide ( often called simply carbide ), and cementite, each used in key industrial applications.
Examples of notable-yet insecure-asymmetric key algorithms include:
Examples include the " masculinized genitalia in female hyenas, exaptive use of an umbilicus as a brooding chamber by snails, the shoulder hump of the giant Irish deer, and several key features of human mentality.
Examples include major pieces of equipment, suitable factory space, and key managerial personnel.
Examples of extended techniques include bowing under the bridge of a string instrument or with two different bows, using key clicks on a wind instrument, blowing and overblowing into a wind instrument without a mouthpiece, or inserting objects on top of the strings of a piano.
Examples of more sophisticated challenge – response algorithms are zero-knowledge password proof and key agreement systems ( such as Secure Remote Password ( SRP )), CRAM-MD5, and ssh's challenge – response system based on RSA.
Examples of such key derivation functions include KDF1, defined in IEEE Std 1363-2000, and similar functions in ANSI X9. 42.
Examples include William Colby, who became director of the CIA, Lucien Conein, who was a key CIA officer in Vietnam, General John Singlaub and Colonel Aaron Bank ( founder of United States Army Special Forces ).
Examples of the round-bottomed Unstan ware have been found here, and provided the key to dating the settlement.
Examples of single line tokens: Tablet on left, key token on right
Examples included participating in a limited jousting exercise, or removing the key from a horse's braided mane.
Examples of key generators include linear feedback shift registers ( LFSR ) and the Solitaire ( or Pontifex ) cipher.
Examples of integrated locking mechanisms are rotating disks ( found in " Scandinavian " style padlocks where a disk rotated by the key enters a notch cut into the shackle to block it from moving ) or lever tumblers ( where a portion of the bolt that secures the shackle enters the tumblers when the correct key is turned in the lock ).
Examples include new investments, expansions, venture capital funding, joint ventures and strategic alliances in key areas such as R & D, business services and core industrial sectors.
Examples of bridge logic abound in Reese, for instance, a player who overcalls but does not lead his suit is likely to lack one or two key honours ; this concept is often called ' the dog that did not bark in the night ' ( after Sherlock Holmes in Arthur Conan Doyle's Silver Blaze ).

Examples and techniques
Examples of denormalisation techniques include:
Examples of these techniques include aerodynamic levitation ( cooling the melt whilst it floats on a gas stream ), splat quenching ( pressing the melt between two metal anvils ) and roller quenching ( pouring the melt through rollers ).
Examples of external styles are Shaolinquan, with its direct explosive attacks and many Wushu forms that have spectacular aerial techniques.
Examples of chest compression include the knee-on-stomach position, or techniques such as leg scissors ( also referred to as body scissors and in budō referred to as do-jime, 胴絞, " trunk strangle " or " body triangle ") where you wrap the legs around the opponent's midsection and squeeze them together.
Examples of techniques used to find approximate solutions to these types of problems are the Lindstedt – Poincaré technique, the method of harmonic balancing, and the method of multiple time scales.
Examples of time and frequency transfer techniques include:
Examples: training of skilled workers, the development of labor hire systems that provide continuity of work in industries with strong seasonal peaks, modern communication tools, investigating market opportunities, researching customer requirements, business planning including financial management, researching the latest farming techniques, risk management skills )
Examples of preventive techniques are: the deep exhalation of the air in the lungs that would otherwise be used in the act of sneezing, holding the breath in while counting to ten or gently pinching the bridge of the nose for several seconds.
Examples of companies that have made use of these techniques in order to persuade their clients:
Examples of similar techniques are still in use in many modern cuisines.
Examples of image analysis techniques in different fields include:
Examples of this influence include the techniques of a side story, back-story and story within a story.
As a result, the courts have said that interpretive techniques that focus on the exact text of a document < ref > Examples include the " plain meaning rule ," Pollock v. Farmers ' Loan & Trust Co., 158 U. S. 601, 619 ( 1895 ) (" The words of the Constitution are to be taken in their obvious sense, and to have a reasonable construction.
Examples for such techniques are Padé approximants, Levin-type sequence transformations, and order-dependent mappings related to renormalization techniques for large-order perturbation theory in quantum mechanics.
Examples of techniques in this class are data clustering or principal component analysis for unsupervised machine learning ( class detection ) as well as artificial neural networks or support vector machines for supervised machine learning ( class prediction, classification ).
Examples of such techniques are
Examples of In situ techniques are PISA ( protein in situ array ), NAPPA ( nucleic acid programmable protein array ) and DAPA ( DNA array to protein array ).
Examples of some of the common factors included within these broad categories are persuasion, a healing setting, engagement, the use of rituals and techniques, suggestion, and emotional learning.
Examples of such techniques are actions that disturb the normal activities of society such as demonstrations, general strike action, riot, terrorism, civil disobedience, and even revolution or insurrection.
Other techniques by which humans modify food organisms include selective breeding ; plant breeding, and animal breeding, and somaclonal variation. Examples include resistance to certain pests, diseases or environmental conditions, or the production of a certain nutrient or pharmaceutical agent.
Examples of standard printmaking techniques which can be used to make monoprints include lithography, woodcut, and etching.

Examples and for
Examples are in public utilities, making military aircraft and accessories, or where the investment and risk for a proprietorship would be too great for a much needed project impossible to achieve by any means other than the corporate form, e.g. constructing major airports or dams.
Examples include Web accessibility a set of guidelines and two accessible web portals designed for people developing reading skills are peepo. com — try typing a letter with your keyboard for more — and peepo. co. uk with enhanced graphics, unique style controls and improved interactivity ( requires an SVG supported browser ).
Examples of assistive technology for visually impairment include the Canadian currency tactile feature, which a system of raised dots in one corner, based on Braille cells but not standard Braille.
Examples of ATC include: NeuroPage which prompt users about meetings, Wakamaru, which provides companionship and reminds users to take medicine and calls for help if something is wrong, and telephone Reassurance systems.
Examples among the Egyptian monks of this submission to the commands of the superiors, exalted into a virtue by those who regarded the entire crushing of the individual will as a goal, are detailed by Cassian and others, e. g. a monk watering a dry stick, day after day, for months, or endeavoring to remove a huge rock immensely exceeding his powers.
Examples of algebraic integers are,, and ( Note, therefore, that the algebraic integers constitute a proper superset of the integers, as the latter are the roots of monic polynomials for all
Examples of prayer which are unique to Luke include Jesus's prayers at the time of his baptism (), his praying all night before choosing the twelve (), and praying for the transfiguration ().
Examples of permanent applications include safety labels for power equipment, foil tape for HVAC duct work, automotive interior trim assembly, and sound / vibration damping films.
Examples include Edward Elgar's Great is the Lord ( 1912 ) and Give unto the Lord ( 1914 ) ( both with orchestral accompaniment ), Benjamin Britten's Rejoice in the Lamb ( 1943 ) ( a modern example of a multi-movement anthem and today heard mainly as a concert piece ), and, on a much smaller scale, Ralph Vaughan Williams ' O taste and see ( 1952 ) ( written for the coronation of Queen Elizabeth II ).
Examples of this wider range of anthem subjects include Marilyn Manson's Irresponsible Hate Anthem and Silverchair's Anthem for the Year 2000.
Examples of continuous numbering include counting by regnal year, principally found in the writings of German authors, for example Mommsen's History of Rome, and ( most ubiquitously ) in the Anno Domini year-numbering system.
Examples are the Sushruta Samhita written in the 3rd or 4th century CE, which recommends beef for certain patients and for pregnant women, and the Charaka Samhita which describes meat as superior to all other kinds of food for convalescents.
Examples are nickel, such as Raney nickel for hydrogenation, and vanadium ( V ) oxide for oxidation of sulfur dioxide into sulfur trioxide.
Examples of such properties are structure ( i. e. the expected positions of the constituent atoms ), absolute and relative ( interaction ) energies, electronic charge distributions, dipoles and higher multipole moments, vibrational frequencies, reactivity or other spectroscopic quantities, and cross sections for collision with other particles.
Examples of applications of computer vision include systems for:
Examples of non-volatile memory are flash memory ( sometimes used as secondary, sometimes primary computer memory ) and ROM / PROM / EPROM / EEPROM memory ( used for firmware such as boot programs ).
Examples for the 9th of November 2003:
Examples cited for this include large fees for the attorneys, while leaving class members with coupons or other awards of little or no value ; unjustified awards are made to certain plaintiffs at the expense of other class members ; and confusing notices are published that prevent class members from being able to fully understand and effectively exercise their rights.

1.072 seconds.