Team:Davidson-Missouri Western/Applications of Hash Functions
From 2008.igem.org
(Difference between revisions)
(New page: *Prove authentication of document *Protect Government Documents *Minimize Cheating on Standardized Tests *Protect Lengthy and Important Instructions *Protect Financial Transactions *P...) |
|||
Line 11: | Line 11: | ||
*Protect Passwords | *Protect Passwords | ||
- | *Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists) | + | *Detect tampered pictures (pictures that have been photo-shopped) |
+ | |||
+ | *Detect tampered pictures with hidden info (terrorists) |
Latest revision as of 03:06, 30 October 2008
- Prove authentication of document
- Protect Government Documents
- Minimize Cheating on Standardized Tests
- Protect Lengthy and Important Instructions
- Protect Financial Transactions
- Protect Passwords
- Detect tampered pictures (pictures that have been photo-shopped)
- Detect tampered pictures with hidden info (terrorists)