Practical Applications

From 2008.igem.org

(Difference between revisions)
(New page: *Prove authentication of document *Protect Government Documents *Minimize Cheating on Standardized Tests *Protect Lengthy and Important Instructions *Protect Financial Transactions *P...)
 
(2 intermediate revisions not shown)
Line 12: Line 12:
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
 +
 +
*[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics Page]
 +
 +
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]

Latest revision as of 22:39, 27 October 2008

  • Prove authentication of document
  • Protect Government Documents
  • Minimize Cheating on Standardized Tests
  • Protect Lengthy and Important Instructions
  • Protect Financial Transactions
  • Protect Passwords
  • Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)