Global Information Lookup Global Information

The Sigma Protocol information


The Sigma Protocol
The Sigma Protocol first edition cover.
AuthorRobert Ludlum
LanguageEnglish
GenreThriller
PublisherSt. Martin's Press
Publication date
October 30, 2001
Publication placeUnited States
Media typePrint (Hardcover, Paperback) & Audiobook
Pages528 pp (first edition)
ISBN0-312-27688-5
OCLC47746174
Dewey Decimal
813/.54 21
LC ClassPS3562.U26 S54 2001

The Sigma Protocol is the last novel written completely by Robert Ludlum, and was published posthumously. It is the story of the son of a Holocaust survivor who gets entangled in an international conspiracy by industrialists and financiers to take advantage of wartime technology.

and 23 Related for: The Sigma Protocol information

Request time (Page generated in 0.8458 seconds.)

Sigma Protocol

Last Update:

The Sigma Protocol is the name of a novel. Sigma Protocol may also refer to: Sigma protocols, a type of cryptographic protocol. This disambiguation page...

Word Count : 54

The Sigma Protocol

Last Update:

The Sigma Protocol is the last novel written completely by Robert Ludlum, and was published posthumously. It is the story of the son of a Holocaust survivor...

Word Count : 714

Proof of knowledge

Last Update:

Sig, referring to the zig-zag symbolizing the three moves of the protocol, and MA, an abbreviation of "Merlin-Arthur". Sigma protocols exist for proving...

Word Count : 1635

Robert Ludlum bibliography

Last Update:

OCLC 44640451. Robert Ludlum's The Cassandra Compact. WorldCat. OCLC 45917096. The Sigma Protocol. WorldCat. OCLC 47746174. Robert Ludlum's The Paris Option. WorldCat...

Word Count : 910

The Janson Directive

Last Update:

cinematic universe of Robert Ludlum adaptations with: The Parsifal Mosaic, The Sigma Protocol, Covert One and crossover films. 2002, US, St. Martin's...

Word Count : 461

Hugo Krawczyk

Last Update:

use Krawczyk’s SIGMA protocol as the cryptographic core of their key exchange procedures. He has also contributed foundational work in the areas of threshold...

Word Count : 547

Security of cryptographic hash functions

Last Update:

security or invalidate the scheme but rather suggest that the initial parameters were too small. Hash functions from Sigma Protocols - there exists a general...

Word Count : 1950

The Parsifal Mosaic

Last Update:

cinematic universe of Robert Ludlum adaptations with the following: The Janson Directive, The Sigma Protocol, Covert One and crossover films. 1982, US, Random...

Word Count : 1635

BLS digital signature

Last Update:

different BLS trio, except for the L). Designed by Sean Bowe in early 2017 as the foundation for an upgrade to the Zcash protocol. It is both pairing-friendly...

Word Count : 799

List of Six Sigma software packages

Last Update:

are generally four classes of software used to support the Six Sigma process improvement protocol: Analysis tools, which are used to perform statistical...

Word Count : 231

Sigma Designs

Last Update:

Internet Protocol (IP) networks. Sigma Designs began making boards for computers, such as the ReelMagic MPEG decoder. Its products were used in many of the first...

Word Count : 1578

SDS Sigma series

Last Update:

machines in the series are the 16-bit Sigma 2 and the 32-bit Sigma 7; the Sigma 7 was the first 32-bit computer released by SDS. At the time, the only competition...

Word Count : 2468

2002 in literature

Last Update:

Unknown Robert Ludlum – The Sigma Protocol Jon McGregor – If Nobody Speaks of Remarkable Things Valerio Massimo Manfredi – The Last Legion Javier Marías...

Word Count : 2272

KLM protocol

Last Update:

The KLM scheme or KLM protocol is an implementation of linear optical quantum computing (LOQC) developed in 2000 by Emanuel Knill, Raymond Laflamme and...

Word Count : 3048

Sigma SD14

Last Update:

the 45.5mm of Pentax PK and M42. The Sigma SA lens protocol is a clone of the Canon EF protocol. This provides the ability for most Canon EF-mount lenses...

Word Count : 1215

Zerocoin protocol

Last Update:

July 2019, Zcoin formally departed from Zerocoin protocol by adopting a new protocol called "Sigma" that prevents counterfeit privacy coins from inflating...

Word Count : 1817

Neural cryptography

Last Update:

Therefore, the use of this protocol is only theoretical so far. The most used protocol for key exchange between two parties A and B in the practice is...

Word Count : 2220

AES50

Last Update:

AES50 links to a centralised star topology. The AES50 protocol supports 24-bit PCM audio and delta-sigma bistream formats (Direct Stream Digital), with...

Word Count : 775

ARPANET

Last Update:

implement the TCP/IP protocol suite. Both technologies became the technical foundation of the Internet. The ARPANET was established by the Advanced Research...

Word Count : 9928

Pareto distribution

Last Update:

P(IV)(\sigma ,\sigma ,1,\alpha )=P(I)(\sigma ,\alpha ),} P ( I V ) ( μ , σ , 1 , α ) = P ( I I ) ( μ , σ , α ) , {\displaystyle P(IV)(\mu ,\sigma ,1,\alpha...

Word Count : 5982

SSP

Last Update:

Society of Playwrights, a trade union Sigma Sigma Phi, an osteopathic medical honor society Society for Science & the Public Society for Scholarly Publishing...

Word Count : 437

Algebraic Eraser

Last Update:

Algebraic Eraser (AE) is an anonymous key agreement protocol that allows two parties, each having an AE public–private key pair, to establish a shared...

Word Count : 1622

Reverse 911

Last Update:

ownership of the technology and rights developed by Sigma, and Motorola has folded Reverse 911 into their Vesta suite of public safety systems. The system is...

Word Count : 669

PDF Search Engine © AllGlobal.net