Show Polls Ask a Question
Slide ImageThumbnailsText Slide ListPrevious SlideNext Slide
Help
Presenter(s):Stephen A. Cook, Ph.D.
Date:1/20/2013
Time:3:00 PM EST
Length:51 Minutes 45 Seconds
Description:The security of encrypted computer protocols such as credit card transactions depends on unproven mathematical assumptions concerning the limits of computation. The central assumption is the conjecture known as ‘P vs NP’, which is one of the “million doll...
Presentation Info Presentation Links
Slide Image
Mediasite 4.3.1852 Previously Recorded