Skip to main content

Home/ Math 1111: Cryptography/ Contents contributed and discussions participated by aconn55

Contents contributed and discussions participated by aconn55

aconn55

Fossil insect hid by carrying a basket of trash - 0 views

  •  
    I found this article to be well written and interesting because of the conversational and casual way it was written. The idea that one needs to remove all pronouns from scientific writing is one that is hammered into students from high school science day 1, yet may not be true. This was not written in the way that I was taught to write about science, however, it was both easy to read and informative. The casual writing style of science blogs may influence other writing standards of other areas of science in the future.
aconn55

Heathrow to get new facial recognition scanners - 0 views

  •  
    Heathrow is linking biometric information with boarding pass information to create a database.
aconn55

The top 10 unsolved cipher texts - 1 views

  •  
    Here's a list of 10 unsolved cipher texts throughout history, #2 is the Beale Papers covered in the chapter, #8 is Kryptos (the background of our website). Some date back as far as 1400 BC and some are more recent like the Zodiac Killer.
aconn55

'Black Box' Software Could Be the Future of Cryptography - 2 views

  •  
    Securing data is how we currently operate, securing software could be the future of internet security.
aconn55

Visual Cryptography - 0 views

  •  
    What is Visual Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. The technique was proposed by Naor and Shamir in 1994. Visual Cryptography uses two transparent images.
1 - 5 of 5
Showing 20 items per page