Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged software

Rss Feed Group items tagged

giordas

http://pages.cpsc.ucalgary.ca/~boyd/papers/biometric-summerschool.pdf - 1 views

  •  
    Essentially, this paper goes through the types of gait recognition software that currently exist as well as the reliability of this software. There are a lot of different elements that influence a persons gait (like terrain, shoes, fatigue, etc.), which effects how well the software works. It's a pretty heavy read but it's really interesting if you want to just jump to a certain section and read in depth. This technology is very much out there and in development, and it is definitely being improved upon. Also, even though this paper is a little bit older, it is still being cited in a lot of more recent research papers and I thought it would give a good enough grasp on the science for our purposes.
aconn55

'Black Box' Software Could Be the Future of Cryptography - 2 views

  •  
    Securing data is how we currently operate, securing software could be the future of internet security.
colleengill

Gait Recognition - 1 views

  •  
    Study discussing the function and practicality of gait recognition software. The results seem to follow what Doctorow states about the function of the software in his novel
andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
parker718

Cryptography | Red Hat Security - 0 views

  •  
    A security blog created by a multinational software company.
smohite1

How "omnipotent" hackers tied to NSA hid for 14 years-and were found at last | Ars Tech... - 1 views

  •  
    Try to avoid opening emails from senders you don't 100% trust and know. Also, routinely check your PC using some kind of antivirus or data scrubbing software to ensure your system hasn't accrued keyloggers or malware that might give bad actors sensitive personal information.
1 - 11 of 11
Showing 20 items per page