Skip to main content

Home/ Math 1111: Cryptography/ Group items matching "US" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Cell Phone Data Could Help Clip Malaria Spread - 0 views

  •  
    Using data from cellphone locations in Kenya, analysts are better able to predict how malaria will spread.
1More

Cipher Solver - 0 views

  •  
    Here is the tool I used that puts the plain text letters over the cipher letters.
1More

Galileo's Pendulum - 0 views

  •  
    The blogger explained all of the science in easy to understand terms and keeps the reader interested using an intriguing writing style.
1More

Adaptation: Why your brain loves to tune out - 0 views

  •  
    Our brains are wired such that we automatically cancel out things that are not changing around us, in a process called adaptation. I really like this article because it not only gives a lot of interesting information about the brain, but it also hooks the reader effectively by providing physical, relatable examples of how our brains tune stuff out. I quickly found myself drawn into the article and interested to learn more.
1More

BBC News - Privacy project uses cryptography to reduce shared info - 0 views

  •  
    This article describes efforts to create an "electronic wallet" to make sharing confidential information more secure and efficient.
1More

Al-Qaeda's Embrace of Encryption Technology: 2007-2011 - 0 views

  •  
    An overview of Al-Qaeda's use of encryption technology in their terrorist activities. Relevant to the debate about distributing powerful cryptography to everyone, including those with bad intentions.
1More

Quantum code sent on common fibre - 0 views

  •  
    The "uncrackable codes" made by exploiting the branch of physics called quantum mechanics no longer require the use of special "dark fibres" and have been sent down kilometres of standard broadband fibre.
1More

How Joe Biden Accidentally Helped Us All E-Mail in Private | Danger Room | Wired.com - 0 views

  •  
    Nice write-up in Wired's "Danger Room" column on Phil Zimmerman, who was recently inducted into the Internet Hall of Fame.
1More

Beneblog: Technology Meets Society: Benetech's Human Rights Spin-off - 0 views

  •  
    During one of our classes, we briefly discussed the use of cryptography to protect eyewitness and victim information during the investigation of human rights violations. The individual I mentioned that day was Patrick Ball, who now will lead a new organization focused on "the data-driven and scientific side of analyzing human rights violations around the world."
1More

PETA sues to give monkey the copyright of selfie photos | abc7.com - 1 views

  •  
    The US Copyright Office has issued a statement saying that it would only issue copyrights to humans. PETA objects to this, having jUSt filed a suit to grant that macaque monkey the copyright for the selfies it took back in 2011. The struggle is real.
1More

Siemens T-43 - 0 views

  •  
    A basic overview of the Siemens T-43 cipher machine used by the Germans, the first mixer machine of its kind.
1More

Republicans are coming for your browsing histories, not your guns | VICE News - 0 views

  •  
    Senator John McCain has filed an amendment that would allow the FBI to retrieve email metadata and web browsing history without warrants. He's proposing we expand use of National Security Letters, which get around the need for warrants and often come with gag orders, so that if you receive an NSL asking for data, you can't tell anyone about it.
1More

Mafia boss undone by clumsy Caesar cipher - 0 views

  •  
    Clues left in the clumsily encrypted notes of a Mafia don have helped Italian investigators to track his associates and ultimately contributed to his capture after years on the run. The recently busted Bernardo Provenzano, reputed to be the "boss of bosses" of the Sicilian Mafia, used a modified form of the Caesar cipher to obscure "sensitive information" in notes left to either his family or underlings.
1More

Steganography and Cryptography Using DNA - 0 views

  •  
    Researchers have applied the microdot principle described by Singh on page 6 to hide messages in DNA sequences.
1More

The Bible Codes - 0 views

  •  
    A brief look at the science of cryptology and the simple encryptions found in the Old Testament. Has a couple of examples and explains the three main transformations used.
1More

Cryptography and Modular Arithmetic - 0 views

  •  
    A useful document detailing the different substitution ciphers (including the Caesar Shift) and the application of Modular Arithmetic in modern day Cryptography.
1More

Spartan Scytale - 1 views

  •  
    This website details how the Spartan scytale was used in 500 B.C. Also features a program that encodes your own message according to the spartan scytale.
1More

Facial Scanning Is Making Gains in Surveillance - 0 views

  •  
    Facial scanning isn't quite to the point where it could be reliably implemented in a school, but it's not far off either.
« First ‹ Previous 61 - 80 of 150 Next › Last »
Showing 20 items per page