Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 2

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

Penney’s game in didactics

100%
EN
This paper describes, at elementary level, Penney‟s game using the example of two players and a symmetric coin. It also provides a generalization for an unlimited number of players and coins, as an example, not an intuitive aspect of the teaching probability theory.
2
Publication available in full text mode
Content available

O bezpieczeństwie internetowym

100%
PL
W pracy omówiono kryptosystemy oparte na krzywych eliptycznych oraz metodę szyfrowania dynamicznego ZT-UNITAKOD. Są to nowe narzędzia zwiększające bezpieczeństwo internetowe. Przedstawiono także sposoby przeciwdziałania phishingowi.
EN
In this paper we present public key cryptosystems. We also talk about cryptosystem which to base on elliptic curve. In 4 part we present how to use ZT-UNITAKOD method to dynamic code. Finally, we discuss the ways to protect the internet user from phishing.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.