Access control

Results: 10445



#Item
341Computer access control / Identity management / Computer security / Federated identity / Identity / Authentication / Notary / Packaging / Digital identity / Identity assurance

Digital ID final option appraisal

Add to Reading List

Source URL: blog.gov.je

Language: English - Date: 2016-07-07 06:54:47
342Internet privacy / World Wide Web / Computing / Software / Hypertext Transfer Protocol / Internet advertising / Computer access control / HTTP cookie / Internet marketing / Web analytics / Ghostery / DoubleClick

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
343Computer access control / Prevention / Password / Security / Computing / CAPTCHA / Form / Password fatigue / Transaction authentication number

PDF Document

Add to Reading List

Source URL: efiling.supremecourt.lk

Language: English - Date: 2014-10-27 09:51:46
344Computing / Media access control / Network architecture / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Carrier sense multiple access with collision detection / Data / Throughput / Physical layer / Transmission time / Carrier sense multiple access / Hidden node problem

Communication Networks of Visible Light Emitting Diodes with Intra-Frame Bidirectional Transmission Qing Wang Domenico Giustiniano

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:48
345Technology / Mobile phones / Computing / Home automation / Electronics / Consumer electronics / Access control / Video door-phone / Doorbell / Door phone / Smartphone / Microsoft Kin

VDP-A1 Product News_05ai

Add to Reading List

Source URL: www.climax.com.tw

Language: English - Date: 2016-05-12 03:31:21
346Cryptography / Watermarking / Digital watermarking / Banknotes / Money forgery / Stationery / Watermark / Access control / Audio watermark / Digital rights management / Cinavia

Side-Channel Watermarks for Embedded Software Georg T. Becker ∗ , Wayne Burleson∗ , Christof Paar∗† , ∗ University of Massachusetts Amherst, USA † Horst G¨ ortz Institute for IT Security Ruhr University Boch

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2011-05-10 15:38:52
347Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cookie / Personal life / World Wide Web

PAVE MEETING: @ 630pm (CA Cafeteria) Meeting called by Melissa & Deanne Welcome and Introductions by Attendees. Family Fun Night Review 

Add to Reading List

Source URL: capave.digitalpto.com

Language: English - Date: 2015-11-16 13:57:41
348Computing / Query languages / Markup languages / Functional languages / XPath / HTML element / XML tree / XQuery / Node / Processing Instruction / Root element / VTD-XML

Formalizing XML Access Control for Update Operations Irini Fundulaki Sebastian Maneth University of Edinburgh

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2010-09-29 11:25:00
349Electromagnetism / Electrical engineering / Electric power conversion / Electric power / Photovoltaics / Voltage regulation / Electronic circuits / Power supplies / Maximum power point tracking / Solar inverter / Power inverter / Control theory

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-13 09:03:11
350Computer access control / Computer security / Identity management / Identity / Equity / Federated identity / Security Assertion Markup Language / Open standard / Trust / Open Identity Exchange / Identity assurance

Final Trust Frameworkweb

Add to Reading List

Source URL: idfederation.org

Language: English - Date: 2014-05-12 11:22:58
UPDATE