Show Polls Ask a Question
Slide ImageThumbnailsText Slide ListPrevious SlideNext Slide
Presenter(s):Stephen A. Cook, Ph.D.
Time:3:00 PM EST
Length:51 Minutes 45 Seconds
Description:The security of encrypted computer protocols such as credit card transactions depends on unproven mathematical assumptions concerning the limits of computation. The central assumption is the conjecture known as ‘P vs NP’, which is one of the “million doll...
Presentation Info Presentation Links
Slide Image
Mediasite 4.3.1852 Previously Recorded