<--- Back to Details
First PageDocument Content
Computer access control / Computing / Software / Cryptography / Smartphones / Federated identity / Access control / Mobile operating systems / Multi-factor authentication / Authentication / Mobile app / Password
Date: 2015-09-15 05:03:41
Computer access control
Computing
Software
Cryptography
Smartphones
Federated identity
Access control
Mobile operating systems
Multi-factor authentication
Authentication
Mobile app
Password

SIGCHI Conference Proceedings Format

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Download Document from Source Website

File Size: 726,00 KB

Share Document on Facebook

Similar Documents

Software / EMC Corporation / VMware / Computing / Proprietary software / Centralized computing / VMware Horizon View / Remote desktop

VMware Social Media Advocacy: Using the VoiceStorm Mobile App How to Get Started: Login to the mobile app with your VMware Advocacy registration username and password. The “Community Code”

DocID: 1xW18 - View Document

Computing / Computer architecture / System software / Smartphones / Online marketplaces / Mobile app / Android / Google Play / IOS / App Store / IOS 10 / MiKandi

CASE STUDY Retail & Ecommerce Mobile App Melbourne

DocID: 1xUjj - View Document

Mobile technology / Technology / Software / E-commerce / Mobile content / Mobile marketing / Truphone / Mobile app / App store / Mobile procurement / Mobile commerce

WHITE PAPERWHAT WILL MY ENTERPRISE MOBILE APP COST?

DocID: 1vrJk - View Document

Privacy Policy Effective Date: 25 MayIntroduction Pleo Technologies ApS, CVR: (“Pleo”, "us", "we", or "our") operates the Pleo.io website, the Pleo web application, the Pleo mobile app and the Pleo

DocID: 1vrEe - View Document

RE A L-TI ME MOBI LE FI ELD COLLECTION – E V E N OF F LINE O R IN THE MOS T REMOT E LOC ATIONS Boundless Anywhere™ is a mobile mapping app for iOS and Android that allows enterprises to extend the value of the Boundl

DocID: 1vlaW - View Document