Key authentication

Results: 993



#Item
51Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
52IdenTrust™ Trust Counsel Smarter and Faster Trust Deployment The IdenTrust™ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

IdenTrust™ Trust Counsel Smarter and Faster Trust Deployment The IdenTrust™ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
53Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
54ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-23 01:39:57
55Transition to DOEGrids CA l l l l l

Transition to DOEGrids CA l l l l l

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2003-05-14 18:51:50
56Preprint of paper to appear at WIFS2010  BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Preprint of paper to appear at WIFS2010 BEYOND PKI: THE BIOCYPTOGRAPHIC KEY INFRASTRUCTURE W. Scheirer1,2 , W. Bishop2 and T. Boult1,2 1

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-11-05 15:10:51
57HCI and Security Systems Andrew Patrick National Research Council of Canada 1200 Montreal Rd. Ottawa, ON K1A 0R6

HCI and Security Systems Andrew Patrick National Research Council of Canada 1200 Montreal Rd. Ottawa, ON K1A 0R6

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:46
58eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG  E-banking is an important service

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
59Making a Nymbler Nymble using VERBS? Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,k2henry,iang}@cs.uwaterloo.ca

Making a Nymbler Nymble using VERBS? Ryan Henry, Kevin Henry, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,k2henry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
60Pay As You Go Foteini Baldimtsi1 , Gesine Hinterw¨alder2 , Andy Rupp3 , Anna Lysyanskaya1 , Christof Paar2,4 , Wayne P. Burleson2 1  Computer Science Department, Brown University

Pay As You Go Foteini Baldimtsi1 , Gesine Hinterw¨alder2 , Andy Rupp3 , Anna Lysyanskaya1 , Christof Paar2,4 , Wayne P. Burleson2 1 Computer Science Department, Brown University

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2012-10-24 17:25:20