際際滷shows by User: clareontherun / http://www.slideshare.net/images/logo.gif 際際滷shows by User: clareontherun / Mon, 27 Feb 2017 17:04:59 GMT 際際滷Share feed for 際際滷shows by User: clareontherun Sha-1 Collision /slideshow/sha1-collision/72628795 sha1collisionusw-170227170459
A brief guide to hashes and their use in encryption, including the recently broken SHA-1 hash algorithm. Updated for the University of South Wales Cyber students.]]>

A brief guide to hashes and their use in encryption, including the recently broken SHA-1 hash algorithm. Updated for the University of South Wales Cyber students.]]>
Mon, 27 Feb 2017 17:04:59 GMT /slideshow/sha1-collision/72628795 clareontherun@slideshare.net(clareontherun) Sha-1 Collision clareontherun A brief guide to hashes and their use in encryption, including the recently broken SHA-1 hash algorithm. Updated for the University of South Wales Cyber students. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sha1collisionusw-170227170459-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A brief guide to hashes and their use in encryption, including the recently broken SHA-1 hash algorithm. Updated for the University of South Wales Cyber students.
Sha-1 Collision from University of South Wales
]]>
580 3 https://cdn.slidesharecdn.com/ss_thumbnails/sha1collisionusw-170227170459-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bitcoin /slideshow/bitcoin-55247958/55247958 bitcoin-151118115253-lva1-app6891
A brief guide to how Bitcoin works - this guide is meant as an overview. Sources used appear at the end.]]>

A brief guide to how Bitcoin works - this guide is meant as an overview. Sources used appear at the end.]]>
Wed, 18 Nov 2015 11:52:53 GMT /slideshow/bitcoin-55247958/55247958 clareontherun@slideshare.net(clareontherun) Bitcoin clareontherun A brief guide to how Bitcoin works - this guide is meant as an overview. Sources used appear at the end. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bitcoin-151118115253-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A brief guide to how Bitcoin works - this guide is meant as an overview. Sources used appear at the end.
Bitcoin from University of South Wales
]]>
1026 5 https://cdn.slidesharecdn.com/ss_thumbnails/bitcoin-151118115253-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hash algorithms in IT security /slideshow/hash-algorithms-in-it-security/53919424 hashalgorithmsitsecurity-151014103105-lva1-app6891
A basic introduction into some of the processing required to create Hash functions, compiled by clare.johnson@coleggwent.ac.uk. For educational purposes only. This is intended to provide an overview for IT security students. For a more detailed understanding please visit the references provided at the end. ]]>

A basic introduction into some of the processing required to create Hash functions, compiled by clare.johnson@coleggwent.ac.uk. For educational purposes only. This is intended to provide an overview for IT security students. For a more detailed understanding please visit the references provided at the end. ]]>
Wed, 14 Oct 2015 10:31:05 GMT /slideshow/hash-algorithms-in-it-security/53919424 clareontherun@slideshare.net(clareontherun) Hash algorithms in IT security clareontherun A basic introduction into some of the processing required to create Hash functions, compiled by clare.johnson@coleggwent.ac.uk. For educational purposes only. This is intended to provide an overview for IT security students. For a more detailed understanding please visit the references provided at the end. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hashalgorithmsitsecurity-151014103105-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A basic introduction into some of the processing required to create Hash functions, compiled by clare.johnson@coleggwent.ac.uk. For educational purposes only. This is intended to provide an overview for IT security students. For a more detailed understanding please visit the references provided at the end.
Hash algorithms in IT security from University of South Wales
]]>
270 5 https://cdn.slidesharecdn.com/ss_thumbnails/hashalgorithmsitsecurity-151014103105-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-clareontherun-48x48.jpg?cb=1523362514 Lecturer in Cyber Security delivering modules up to Level 7. Also has a keen interest in Educational Technology and will be commencing a PhD in April 2017 looking at issues surrounding academic integrity and teaching and assessment methods in the digital age. Completed an MA in Education and ICT at University of South Wales (2014), researching online collaborative technologies and higher order thinking. Also very experienced at FE level, including staff mentoring and developing excellence in teaching and learning. http://clareontherun.blogspot.com/ https://cdn.slidesharecdn.com/ss_thumbnails/sha1collisionusw-170227170459-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sha1-collision/72628795 Sha-1 Collision https://cdn.slidesharecdn.com/ss_thumbnails/bitcoin-151118115253-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/bitcoin-55247958/55247958 Bitcoin https://cdn.slidesharecdn.com/ss_thumbnails/hashalgorithmsitsecurity-151014103105-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/hash-algorithms-in-it-security/53919424 Hash algorithms in IT ...