SlideShare ist ein Scribd-Unternehmen logo
1 von 86
Downloaden Sie, um offline zu lesen
Van Hoang Nguyen
Mail: startnewday85@gmail.com
Department of Computer Science – FITA – HUA
Information Security Course --------------------------------------------- Fall 2013
Dept. of Computer Science – FITA – HUA
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Cryptography
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
FMNTOTOPSHRERLIITNEEDSSCXCESEEAORHN.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Code it, please.
Are you programmer?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Find a mathematical model, please.
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
F O R E X A
M P L E C O
N S I D E R
T H I S S H
O R T S E N
T E N C E .
A O R H N .
X C E S E E
E E D S S C
R L I I T N
O P S H R E
F M N T O T
AORHN.XCESEEEEDSSCRLIITNOPSHREFMNTOT
Information Security ------------- Fall 2013
Van Hoang Nguyen
PlainText: WE ARE DISCOVERED FLEE AT ONCE with 3 rails
CipherText: WECRLTEERDSOEEFEAOCAIVDEN
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Transposition Substitution
Information Security ------------- Fall 2013
Van Hoang Nguyen
L
L-1
Data’
Information Security ------------- Fall 2013
Van Hoang Nguyen
What is your choice?
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
CipherText only Attack
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by http://www.dailymail.co.uk/news/article-2316536/40-000-piece-world-record-jigsaw-
collapses-floor-Weymouth-creator-turns-back.html
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
E (Encryption): K*P C
D (Decryption): K*C P
P, K
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
= = A*
is a set of all permutations
E (Encryption): E(k, m) = m[k(1)]m[k(2)]….m[k(n)]
D (Decryption): D(k, c) = c[k-1(1)] c[k-1(2)]… c[k-1(n)]
35 letters ==> 50*1030 permutations
Information Security ------------- Fall 2013
Van Hoang Nguyen
= A* and = B*
= { k | k is a bijection from A to B}
E (Encryption): E(k, m) = k(m[1])k(m[2]) …. k(m[n])
D (Decryption): D(k, c) = k-1(c[1]) k-1(c[2]) … k-1(c[n])
26 letters ==> 5*1026 alphabetic ciphers
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu 'Abd al-Rahman al-Khalil ibn
Ahmad ibn 'Amr ibn Tammam al
Farahidi al-Zadi al Yahmadi
Information Security ------------- Fall 2013
Van Hoang Nguyen
Abu Yusuf Ya'qub ibn Is-haq ibn as-
Sabbah ibn 'omran ibn Ismail al-Kindi
Information Security ------------- Fall 2013
Van Hoang Nguyen
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
E T A O I N S R H D L U C M F Y W G P B V K X Q J Z
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
a b c d e f g h i j k l m n o p q r s t u
09 48 13 01 14 10 06 23 32 15 04 26 22 18 00 38 94 29 11 17 08
12 81 41 03 16 31 25 39 70 37 27 58 05 95 35 19 20 61
33 62 45 24 50 73 51 59 07 40 36 30 63
47 79 44 56 83 84 66 54 42 76 43
53 46 65 88 71 72 77 86 49
67 55 68 93 91 90 80 96 69
78 57 99 75
92 64 85
74 97
82
87
98
Homophonic cipher
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
XNYYMJJITBSFSIMFAJSTXMFRJHMJJP
GDOTBQFSIPSJJGDPSJJBMFYHFWJNK
TWFSDSFRJBMFYKTWTWIJWTWIJLWJJ
QJYRJXHWJBYMJJZUFUJLQJYRJQTTX
JYMDYTSLZJBNYMBNSJHFQQJXYYMT
ZYMFYYMNSLFQJLBMNHMNXYMNSSJX
YYMNSJTWRNSJYMTZXMFQYSTYGJXF
AJIGDBTWPXYMTZMFXYGJJSFXNSSJ
WYTTWZNSJIYWZSPXTSBNYMJWJIKT
WPXJRUYDXHFWJHWTBXNFSIDTZKNQ
QYMJHZUFSIKNQQYMJHFSMFAJFWTZ
XJGJKTWJYMJRTWSJAJWDRTRJSYINJ
XFRFSJAJWDRTRJSYTSJNXGTWS
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNYYMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFYHFWE
NKTWFSDSFREBMFYKTWTWIEWTWIEL
WEEQEYREXHWEBYMEEZUFUELQEYR
EQTTXEYMDYTSLZEBNYMBNSEHFQQE
XYYMTZYMFYYMNSLFQELBMNHMNXY
MNSSEXYYMNSETWRNSEYMTZXMFQY
STYGEXFAEIGDBTWPXYMTZMFXYGEE
SFXNSSEWYTTWZNSEIYWZSPXTSBNY
MEWEIKTWPXERUYDXHFWEHWTBXNF
SIDTZKNQQYMEHZUFSIKNQQYMEHFS
MFAEFWTZXEGEKTWEYMERTWSEAE
WDRTRESYINEXFRFSEAEWDRTRESYT
SENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E ?
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNTTMEEITBSFSIMFAESTXMFREHMEE
PGDOTBQFSIPSEEGDPSEEBMFTHFWE
NKTWFSDSFREBMFTKTWTWIEWTWIEL
WEEQETREXHWEBTMEEZUFUELQETR
EQTTXETMDTTSLZEBNTMBNSEHFQQE
XTTMTZTMFTTMNSLFQELBMNHMNXT
MNSSEXTTMNSETWRNSETMTZXMFQT
STTGEXFAEIGDBTWPXTMTZMFXTGEE
SFXNSSEWTTTWZNSEITWZSPXTSBNT
MEWEIKTWPXERUTDXHFWEHWTBXNF
SIDTZKNQQTMEHZUFSIKNQQTMEHFS
MFAEFWTZXEGEKTWETMERTWSEAEW
DRTRESTINEXFRFSEAEWDRTRESTTS
ENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y
E T
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
TMEEITBSFSIMFAESTXMFREHMEEPGD
OTBQFSIPSEEGDPSEEBMFTHFWENKT
WFSDSFREBMFTKTWTWIEWTWIELWE
EQETREXHWEBTMEEZUFUELQETREQ
TTXETMDTTSLZEBNTMBNSEHFQQEXT
TMTZTMFTTMNSLFQELBMNHMNXTMN
SSEXTTMNSETWRNSETMTZXMFQTSTT
GEXFAEIGDBTWPXTMTZMFXTGEESFX
NSSEWTTTWZNSEITWZSPXTSBNTME
WEIKTWPXERUTDXHFWEHWTBXNFSID
TZKNQQTMEHZUFSIKNQQTMEHFSMFA
EFWTZXEGEKTWETMERTWSEAEWDRT
RESTINEXFRFSEAEWDRTRESTTSENX
GTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T ?
Information Security ------------- Fall 2013
Van Hoang Nguyen
XNT
THEEITBSFSIHFAESTXHFREHHEEPGD
OTBQFSIPSEEGDPSEEBHFTHFWENKT
WFSDSFREBHFTKTWTWIEWTWIELWEE
QETREXHWEBTHEEZUFUELQETREQTT
XETHDTTSLZEBNTHBNSEHFQQEXTTH
TZTHFTTHNSLFQELBHNHHNXTHNSSE
XTTHNSETWRNSETHTZXHFQTSTTGEX
FAEIGDBTWPXTHTZHFXTGEESFXNSSE
WTTTWZNSEITWZSPXTSBNTHEWEIKT
WPXERUTDXHFWEHWTBXNFSIDTZKN
QQTHEHZUFSIKNQQTHEHFSHFAEFWT
ZXEGEKTWETHERTWSEAEWDRTRESTI
NEXFRFSEAEWDRTRESTTSENXGTWS
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
Information Security ------------- Fall 2013
Van Hoang Nguyen
SITTHEEDOWNANDHAVENOSHAMECH
EEKBYJOWLANDKNEEBYKNEEWHATC
AREIFORANYNAMEWHATFORORDERO
RDEGREELETMESCREWTHEEUPAPEG
LETMELOOSETHYTONGUEWITHWINEC
ALLESTTHOUTHATTHINGALEGWHICHI
STHINNESTTHINEORMINETHOUSHALT
NOTBESAVEDBYWORKSTHOUHASTBE
ENASINNERTOORUINEDTRUNKSONWI
THEREDFORKSEMPTYSCARECROWSI
ANDYOUFILLTHECUPANDFILLTHECANH
AVEAROUSEBEFORETHEMORNEVERY
MOMENTDIESAMANEVERYMOMENTON
EISBORN
0
5
10
15
J Y S T M F W X N R Q I B Z H D G P K A L U O
0
2
4
6
8
10
12
14
E T A O I N S R H D L U C M F Y WG P B V K X Q J Z
J Y M
E T H
10 25 13
5 20 8
Shift Cipher with key = 5
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sit thee down, and have no shame,
Cheek by jowl, and knee by knee:
What care I for any name?
What for order or degree?
Let me screw thee up a peg:
Let me loose thy tongue with wine:
Callest thou that thing a leg?
Which is thinnest? thine or mine?
Thou shalt not be saved by works:
Thou hast been a sinner too:
Ruined trunks on withered forks,
Empty scarecrows, I and you!
Fill the cup, and fill the can:
Have a rouse before the morn:
Every moment dies a man,
Every moment one is born.
Alfred Tennyson (1809-1892)
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQQMVMVJLEYMHFEFNZPSDLPPSD
LPEVQMWCXYMDAVQEEFIQCAYTQOW
CXYMWMSEMEFCFWYEYQETRLIQYCG
MTWCWFBSMYFPLRXTQYEEXMRULUK
SGWFPTLRQAERLUVPMVYQYCXTWFQ
LMTELSFJPQEHMOZCIWCIWFPZSLMA
EZIQVLQMZVPPXAWCSMZMORVGVVQ
SZETRLQZPBJAZVQIYXEWWOICCGDW
HQMMVOWSGNTJPFPPAYBIYBJUTWRL
QKLLLMDPYVACDCFQNZPIFPPKSDVPT
IDGXMQQVEBMQALKEZMGCVKUZKIZB
ZLIUAMMVZ
J 57 15.531
Y 32 8.767
S 31 8.493
T 29 7.945
M 25 6.849
F 25 6.849
W 23 6.301
X 19 5.205
N 18 4.932
R 12 3.288
Q 12 3.288
I 11 3.014
B 11 3.014
Z 10 2.740
H 9 2.466
D 9 2.466
G 7 1.918
P 6 1.644
K 6 1.644
A 5 1.370
L 5 1.370
U 4 1.096
O 1 0.274
M 35 9.537
Q 27 7.357
P 23 6.267
E 21 5.722
L 21 5.722
V 21 5.722
W 19 5.177
Z 18 4.905
F 17 4.632
Y 17 4.632
I 16 4.360
C 16 4.360
T 13 3.542
R 11 2.997
S 11 2.997
U 10 2.725
A 10 2.725
X 9 2.452
B 8 2.180
O 8 2.180
G 8 2.180
D 8 2.180
K 7 1.907
J 5 1.362
H 4 1.090
N 4 1.090
Information Security ------------- Fall 2013
Van Hoang Nguyen
0
2
4
6
8
10
12
M Q P E L V W Z F Y I C T R S U A X B O G D K J H N
0
2
4
6
8
10
12
14
16
J Y S T M F W X N R Q I B Z H D G P K A L U O
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
WUBEFIQLZURMVOFEHMYMWTIXCGT
MPIFKRZUPMVOIRQMMWOZMPULMBN
YVQQQMVMVJLEYMHFEFNZPSDLPPSD
LPEVQMWCXYMDAVQEEFIQCAYTQOW
CXYMWMSEMEFCFWYEYQETRLIQYCG
MTWCWFBSMYFPLRXTQYEEXMRULUK
SGWFPTLRQAERLUVPMVYQYCXTWFQ
LMTELSFJPQEHMOZCIWCIWFPZSLMA
EZIQVLQMZVPPXAWCSMZMORVGVVQ
SZETRLQZPBJAZVQIYXEWWOICCGDW
HQMMVOWSGNTJPFPPAYBIYBJUTWRL
QKLLLMDPYVACDCFQNZPIFPPKSDVPT
IDGXMQQVEBMQALKEZMGCVKUZKIZB
ZLIUAMMVZ
Information Security ------------- Fall 2013
Van Hoang Nguyen
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
E-F-I-Q 95
E-T-R-L 120
P-S-D-L-P 5
W-C-X-Y-M 20
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Arthur Zimmermann
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
APOCALYPTIC, CRYPT, EGYPT
Information Security ------------- Fall 2013
Van Hoang Nguyen
N Q C B E O T H E X G
A P O C A L Y P T I C
APOCALYPTIC, CRYPT, EGYPT
C I T H E
C R Y P T
A T T H E
E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E A T T H E
C A N A D A E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G A T T H E
C A N A D A B R A Z E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E
C A N A D A B R A Z I L E G Y P T
Information Security ------------- Fall 2013
Van Hoang Nguyen
T H E M E E T I N G I S A T T H E D O C K
C A N A D A B R A Z I L E G Y P T C U B A
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Sourced by The Code book – Simon Sigh
Information Security ------------- Fall 2013
Van Hoang Nguyen
10 000 000 000 000 000
Information Security ------------- Fall 2013
Van Hoang Nguyen
Marian Rejewski (1905-1980)
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen
Information Security ------------- Fall 2013
Van Hoang Nguyen

Weitere ähnliche Inhalte

Mehr von Hoang Nguyen

SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systems
Hoang Nguyen
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
Hoang Nguyen
 
Why the Semantic Web will nerver work
Why the Semantic Web will nerver workWhy the Semantic Web will nerver work
Why the Semantic Web will nerver work
Hoang Nguyen
 

Mehr von Hoang Nguyen (20)

GANs and Applications
GANs and ApplicationsGANs and Applications
GANs and Applications
 
Scrum - An introduction
Scrum - An introductionScrum - An introduction
Scrum - An introduction
 
ORM in Django
ORM in DjangoORM in Django
ORM in Django
 
Introduction to Cross-platform App Development
Introduction to Cross-platform App DevelopmentIntroduction to Cross-platform App Development
Introduction to Cross-platform App Development
 
Conistency of random forests
Conistency of random forestsConistency of random forests
Conistency of random forests
 
Trust - Digital Signature
Trust - Digital SignatureTrust - Digital Signature
Trust - Digital Signature
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Multiple processor systems
Multiple processor systemsMultiple processor systems
Multiple processor systems
 
Multiprocessor Systems
Multiprocessor SystemsMultiprocessor Systems
Multiprocessor Systems
 
Introduction to AOS course
Introduction to AOS courseIntroduction to AOS course
Introduction to AOS course
 
Introduction to CNS Course
Introduction to CNS CourseIntroduction to CNS Course
Introduction to CNS Course
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 
Nosql intro
Nosql introNosql intro
Nosql intro
 
Static Testing
Static TestingStatic Testing
Static Testing
 
Testing in the lifecycle
Testing in the lifecycleTesting in the lifecycle
Testing in the lifecycle
 
Fundamentals of Testing 2
Fundamentals of Testing 2Fundamentals of Testing 2
Fundamentals of Testing 2
 
Fundamentals of testing 1
Fundamentals of testing 1Fundamentals of testing 1
Fundamentals of testing 1
 
Why the Semantic Web will nerver work
Why the Semantic Web will nerver workWhy the Semantic Web will nerver work
Why the Semantic Web will nerver work
 
IS sum up 2011
IS sum up 2011IS sum up 2011
IS sum up 2011
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Classical ciphers