BEGIN:VCALENDAR
VERSION:2.0
METHOD:PUBLISH
X-WR-CALNAME;VALUE=TEXT:Events
PRODID:-//Brant Radiant Heaters//Events
BEGIN:VEVENT
METHOD:PUBLISH
DTSTART:2017-11-27T05:00:00Z
DTEND:2017-12-01T05:00:00Z
SUMMARY:Yoda
UID:1
DESCRIPTION:Cryptography&nbsp\;or&nbsp\;cryptology&nbsp\;(from&nbsp\;Greek&nbsp\;κρυπτός&nbsp\;kryptós\, \"hidden\, secret\"\; and&nbsp\;γράφειν&nbsp\;graphein\, \"writing\"\, or&nbsp\;-λογία&nbsp\;-logia\, \"study\"\, respectively[1]) is the practice and study of techniques for&nbsp\;secure communication&nbsp\;in the presence of third parties called&nbsp\;adversaries.[2]&nbsp\;More generally\, cryptography is about constructing and analyzing&nbsp\;protocols&nbsp\;that prevent third parties or the public from reading private messages\;[3]&nbsp\;various aspects in&nbsp\;information security&nbsp\;such as data&nbsp\;confidentiality\,&nbsp\;data integrity\,&nbsp\;authentication\, and&nbsp\;non-repudiation[4]are central to modern cryptography. Modern cryptography exists at the intersection of the disciplines of&nbsp\;mathematics\,&nbsp\;computer science\,&nbsp\;electrical engineering\,&nbsp\;communication science\, and&nbsp\;physics. Applications of cryptography include&nbsp\;electronic commerce\,&nbsp\;chip-based payment cards\,&nbsp\;digital currencies\,&nbsp\;computer passwords\, and&nbsp\;military communications.Cryptography prior to the modern age was effectively synonymous with&nbsp\;encryption\, the conversion of information from a readable state to apparent&nbsp\;nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients\, thereby precluding unwanted persons from doing the same. The cryptography literature often uses the name Alice (\"A\") for the sender\, Bob (\"B\") for the intended recipient\, and Eve (\"eavesdropper\") for the adversary.[5]&nbsp\;Since the development of&nbsp\;rotor cipher machines&nbsp\;in&nbsp\;World War&nbsp\;I&nbsp\;and the advent of&nbsp\;computers&nbsp\;in&nbsp\;World War&nbsp\;II\, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
CLASS:PUBLIC
STATUS:CONFIRMED
END:VEVENT
BEGIN:VEVENT
METHOD:PUBLISH
DTSTART:2018-03-21T04:00:00Z
DTEND:2018-03-24T04:00:00Z
SUMMARY:CMPX Show
UID:3
DESCRIPTION:Come join us at the CMPX Show\, booth #1743!
CLASS:PUBLIC
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
