Skip to main content

Home/ Groups/ Math 1111: Cryptography
1More

Police need new internet surveillance tools, say chiefs - British Columbia - CBC News - 0 views

  •  
    Warrantless wiretapping in Canada?
1More

Official Site of the Navajo Code Talkers - 0 views

  •  
    The official website of the Code Talkers. It gives a description of the code used and stories of the remaining Navajos.
1More

Pearl Harbor Review - JN-25 - NSA/CSS - 1 views

  •  
    JN-25: code used during and slightly before world war II
1More

Understanding Cryptography in Modern Military Communications - 0 views

  •  
    A look at some older cryptography used by the military and a look at what they are transitioning to
1More

Early U.S. military cryptography - 0 views

  •  
    A description of the U.S. military's first cryptographic system.
1More

Galileo's Pendulum - 0 views

  •  
    The blogger explained all of the science in easy to understand terms and keeps the reader interested using an intriguing writing style.
1More

The Smart Scanner That May Put Shampoo Back Into Your Carry-on | Weapons & Security | D... - 0 views

  •  
    I thought this post was incredibly well written, starting with the title. The title is captivating and draws readers in by suggesting a solution to a common annoyance. The article also addresses the bigger scientific achievement: this scanner may be useful for medical purposes such as measuring glucose levels or cancer cell levels at tumor sites. The article provides sufficient, interesting information while creatively tying in witty humor. 
1More

Amateur planet hunters find a world with a four star rating - 0 views

  •  
    Astronomy is a very interesting subject but also a very complex one. I picked this article because the author does a good job of making a complex subject simpler to understand, while keeping the topic interesting by addressing the reader with a natural and creative tone.
2More

5 Essential Privacy Tools For The Next Crypto War - Forbes - 5 views

  •  
    Gives you tools to make sure your information is safe.
  •  
    One word of caution: This piece is from 2012, before we learned what the NSA was up to. It's quite possible that some of these mechanisms are now known to be insecure.
« First ‹ Previous 521 - 540 Next › Last »
Showing 20 items per page