Diffie: Explains Public Key Encyption.

  Рет қаралды 2,102

Turing Awardee Clips

Turing Awardee Clips

Күн бұрын

Пікірлер: 5
@codecleric4972
@codecleric4972 2 жыл бұрын
This man is a true genius and every person who's ever used or benefitted from the internet owes him a salute
@braddockbrawler
@braddockbrawler 19 күн бұрын
Hero.
@MisterTAllred
@MisterTAllred 3 ай бұрын
"Security is the science of minimizing Trust." Bingo.
@truantj
@truantj 2 жыл бұрын
Legend.
@rajneeshshetty710
@rajneeshshetty710 3 жыл бұрын
Think I was trying to say was that when I in India 1975-1998 (especially), the x.11-25 transition set the tone for PKI. The RS-232 drivers for Linux devices before the OS was introduced had few takers because SAN's seemed expensive although completely acceptable. That was only after the "adaptive networking" (Bay Networks) and the "network is the computer"(Sun Micro). When running the VT-100 emulation, there were no real problems and then was asked to use 220 instead. Thought 3270 more reliable depending on what's involved, however switching on a little transistor radio would still impact a wireless content browsing connection(non-audio only). If there are only two bootloaders for Linux, (www.distrowatch.com), would repository formats have to differ much, meaning the more streamlining where possible, would help with centralisation and cost-calibration(Yukon Huong's talk at KZbin recently). If education is to be a priority, decision-making would need to be easier for the not-so-technical. Under-developed economies can't afford to pay for expensive computers (re-cycling and code-reuse(SEI-CMM))and exhorbidant connectivity, So centralised storage, with a default option to back-up for distributed nodes obviously. Metadirectory standards, hopefully not all in private hands, would help with credibility. Procurement policies could define specific models and brands which would default to secure privacy intensive variants for content access. Just thoughts currently, not in a good space personally, need time off for awhile
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 119 М.
Fake watermelon by Secret Vlog
00:16
Secret Vlog
Рет қаралды 15 МЛН
Wirth on the importance of abstraction to language design
3:48
Turing Awardee Clips
Рет қаралды 3,8 М.
Diffie-Hellman Key Exchange: How to Share a Secret
9:09
Spanning Tree
Рет қаралды 148 М.
Public key cryptography - Diffie-Hellman Key Exchange (full version)
8:38
Art of the Problem
Рет қаралды 885 М.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Computerphile
Рет қаралды 962 М.
Kahan on the 8087 and designing Intel's floating point
9:26
Turing Awardee Clips
Рет қаралды 4,3 М.
Key Exchange Problems - Computerphile
9:18
Computerphile
Рет қаралды 356 М.
Kahan on HP calculators: Solve, Integrate and Matrix Operations
8:26
Turing Awardee Clips
Рет қаралды 13 М.