Key authentication

Results: 993



#Item
41IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
42Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Advances in Programming Languages Certifying correctness David Aspinall School of Informatics The University of Edinburgh

Add to Reading List

Source URL: www.inf.ed.ac.uk

Language: English - Date: 2010-01-27 19:53:39
43Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
44European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
45Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Public-Key Cryptography for RFID-Tags? L. Batina1 , J. Guajardo2 , T. Kerins2 , N. Mentens1 , P. Tuyls2 , and I. Verbauwhede1 1 Katholieke Universiteit Leuven, ESAT/COSIC, Belgium {Lejla.Batina,Nele.Mentens,Ingrid.Verbau

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-08-29 03:45:16
46Keyhub_Technical_Overview_28

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
47Preprint of paper to appear at WIFS2010  BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
48Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-12-29 15:33:54
49Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Microsoft PowerPoint - Geoencryption Authentication Di Qiu May 2006.ppt

Add to Reading List

Source URL: gps.stanford.edu

Language: English - Date: 2006-06-13 19:25:54
50Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27