File:Emoji_u1f510.svg
From Wikipedia, the free encyclopedia
Original file (SVG file, nominally 128 × 128 pixels, file size: 2 KB)
This is a file from the Wikimedia Commons. Information from its description page there is shown below. Commons is a freely licensed media file repository. You can help. |
Summary
DescriptionEmoji u1f510.svg |
English: A colored Emoji from Noto project, released under Apache license
Unicode name: Closed lock with key Annotations: Closed, Key, Lock, Object, Secure |
Date | |
Source | https://github.com/googlei18n/noto-emoji/blob/f2a4f72/svg/emoji_u1f510.svg |
Author | |
SVG development InfoField | This emoji was created with Adobe Illustrator. |
Licensing
Copyright © Google
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at https://www.apache.org/licenses/LICENSE-2.0. Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. | |
Apache License, Version 2.0Apache License 2.0http://www.apache.org/licenses/LICENSE-2.0truetrue |
Items portrayed in this file
depicts
23 May 2017
image/svg+xml
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 06:20, 3 March 2020 | 128 × 128 (2 KB) | Losonszki Zoli | Reverted to version as of 10:48, 20 August 2014 (UTC) | |
19:25, 27 May 2017 | 128 × 128 (1 KB) | Ebrahim | update | ||
20:45, 19 May 2017 | 512 × 512 (2 KB) | Ebrahim | update | ||
10:48, 20 August 2014 | 128 × 128 (2 KB) | Ebrahim | VicuñaUploader 1.20 |
File usage
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- ABA digital signature guidelines
- Adversary (cryptography)
- Brute Force: Cracking the Data Encryption Standard
- CAST-256
- CS-Cipher
- Ciphertext expansion
- Code word (communication)
- Codress message
- Communication Theory of Secrecy Systems
- Concrete security
- Controlled Cryptographic Item
- Cover (telecommunications)
- Cryptanalytic computer
- Crypto (book)
- Crypto API (Linux)
- Cryptographic Message Syntax
- Cryptographic Module Validation Program
- Cryptographie indéchiffrable
- Cryptography newsgroups
- Cryptologia
- Cryptology ePrint Archive
- Cryptosystem
- DEAL
- Data Authentication Algorithm
- Delegated Path Discovery
- Delegated Path Validation
- Digital Signature Standard
- Distribution ensemble
- Enigmail
- FISH (cipher)
- FORK-256
- Floradora
- Full Domain Hash
- HAS-160
- HAVAL
- HX-63
- IBM 4758
- IDEA NXT
- Initiative for Open Authentication
- Iraqi block cipher
- JADE (cipher machine)
- Java Cryptography Architecture
- Journal of Cryptology
- KCDSA
- KOV-14
- KSD-64
- KY-58
- Key generator
- Key signature (cryptography)
- Key signing party
- Keysigning
- Kiss (cryptanalysis)
- Link encryption
- MMB (cipher)
- Matt Curtin
- Mcrypt
- Message forgery
- Mimic function
- N-hash
- Nonlinear-feedback shift register
- Oakley protocol
- Open Media Commons
- PGPfone
- Passive attack
- Password-based cryptography
- Pike (cipher)
- Pinwheel (cryptography)
- Polyinstantiation
- Product cipher
- Pseudo-Hadamard transform
- Pseudorandom ensemble
- REDOC
- Red/black concept
- Reeds–Sloane algorithm
- Reflector (cipher machine)
- Residual block termination
- Russian copulation
- S-1 block cipher
- SAVILLE
- SEAL (cipher)
- SECG
- SHARK
- SOBER-128
- Schnorr group
- Scramdisk
- Secure Communication based on Quantum Cryptography
- Secure access module
- Security protocol notation
- Small subgroup confinement attack
- Smart cow problem
- Snefru
- Square (cipher)
- Strong RSA assumption
- Torus-based cryptography
- Transmission security
- Turing (cipher)
- VINSON
- WAKE (cipher)
- Zero-knowledge password proof
- Zimmermann–Sassaman key-signing protocol
View more links to this file.
Global file usage
The following other wikis use this file:
- Usage on ar.wikipedia.org
- Usage on be-tarask.wikipedia.org
- Usage on en.wiktionary.org
- Usage on eo.wiktionary.org
- Usage on es.wiktionary.org
- Usage on he.wikipedia.org
- Usage on hu.wiktionary.org
- Usage on id.wiktionary.org
- Usage on ja.wikipedia.org
- Usage on ja.wiktionary.org
- Usage on mn.wikipedia.org
- Usage on mnw.wiktionary.org
- Usage on ms.wiktionary.org
- Usage on no.wikipedia.org
- Usage on pt.wikipedia.org
- Cifra
- Criptograma
- MD2
- MD4
- Sistema criptográfico
- RSA Data Security, Inc.
- Predefinição:Esboço-criptografia
- Esteganografia
- 3DES
- Senha
- Encriptação
- Wikipédia:Lista de predefinições/Esboços/Ciências e tecnologia
- Análise de frequência
- Algoritmo de dispersão
- Canal seguro
- Cifra de substituição monoalfabética
- Atbash
- Selo cronológico
- Esteganoanálise
- Java Cryptography Extension
View more global usage of this file.
Metadata
This file contains additional information, probably added from the digital camera or scanner used to create or digitize it.
If the file has been modified from its original state, some details may not fully reflect the modified file.
Width | 128px |
---|---|
Height | 128px |