All public logs
Jump to navigation
Jump to search
Combined display of all available logs of HORSE - Holistic Operational Readiness Security Evaluation.. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 12:38, 16 October 2014 Mdpeters talk contribs undeleted page 22 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 24 (2 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 1 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 10 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 11 (3 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 12 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 23 (3 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 21 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 20 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 2 (5 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 19 (5 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 18 (3 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 17 (5 revisions restored)
- 12:25, 16 October 2014 Mdpeters talk contribs deleted page 17 (Vandalism: content was: "==Footnote 17== A nonrepudiation service provides only proof of facts to defend against an opponent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Commen...)
- 12:25, 16 October 2014 Mdpeters talk contribs deleted page 18 (Vandalism: content was: "==Footnote 18== For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinaf...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 19 (Vandalism: content was: "==Footnote 19== In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back t...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 2 (Vandalism: content was: "==Footnote 2== See, e.g., U. C. C. § 1-201(39) (1992). == Staging the news and staging reality are the same thing == Jon Rappoport Prison Planet.com October 13, 2013 Hi! Were the newsmanufacturing witnesses, creating dupe...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 20 (Vandalism: content was: "==Footnote 20== Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two way...)
- 12:22, 16 October 2014 Mdpeters talk contribs deleted page 21 (Vandalism: content was: "==Footnote 21== Many cryptographic systems will function securely only if the keys are lengthy and complex, too lengthy and complex for a person to easily remember or use. == Teen Facing 8 Years Prison After Violent Joke in On...)
- 12:22, 16 October 2014 Mdpeters talk contribs deleted page 22 (Vandalism: content was: "==Footnote 22== See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & Mike Speciner, Network Security: Private Communication in a Public World 48-56 (1995) (hereinafter "Kaufman, et al., Network Security...)