Assertion list
cryptography (primary) → ReceivesAction

Results from Ascent++: 18
cryptographyReceivesAction utilized to ensure corporate in… 0.43
cryptographyReceivesAction deployed 0.29
cryptographyReceivesAction derived 0.29
cryptographyReceivesAction taught at mit 0.29
cryptographyReceivesAction embraced by instructor 0.25
cryptographyReceivesAction associated in today's computer-… 0.25
cryptographyReceivesAction associated with creation 0.25
cryptographyReceivesAction connected to cryptocurrencie 0.25
cryptographyReceivesAction removed 0.25
cryptographyReceivesAction used in atm 0.25
cryptographyReceivesAction used in bitcoin addresses 0.25
cryptographyReceivesAction used in hash functions 0.25
cryptographyReceivesAction used to encrypt information 0.25
cryptographyReceivesAction used to protect credit card inf… 0.25
cryptographyReceivesAction utilized to ensure email messag… 0.25
cryptographyReceivesAction utilized to ensure mastercard d… 0.25
cryptographyReceivesAction implemented through simple huma… 0.20
cryptographyReceivesAction used to protect sensitive trans… 0.20