Key management

Results: 16095



#Item
981

ACTS OF LEADERSHIP IN COMPLEX PROJECTS KEY WORDS: Leadership, Project manager competencies, Complex projects, Meyers-Briggs, Management Drives, NTCP model, Complexity mapping, Cynefin model, Uncertainty, Group Decision T

Add to Reading List

Source URL: hennyportman.files.wordpress.com

Language: English - Date: 2015-03-12 15:32:08
    982ITunes / Mobile app / App store / Microsoft App-V / Progressive web app / Mobile application management

    App47 for Consumer App Developers App47’s Key Benefits Customizable Enterprise App Store Securely deploy public and private apps via your own company branded app store

    Add to Reading List

    Source URL: www.app47.com

    Language: English - Date: 2013-06-07 13:35:19
    983

    Dynamic and Efficient Key Management for Access Hierarchies MIKHAIL J. ATALLAH Purdue University MARINA BLANTON University of Notre Dame

    Add to Reading List

    Source URL: www.cse.nd.edu

    Language: English - Date: 2009-02-11 09:47:47
      984Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

      The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:02
      985Cryptography / Public-key cryptography / Public key infrastructure / Key management / Public key certificate / Permanent account number / Identity document / Certificate authority / Authentication / Key / Smart card

      NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

      Add to Reading List

      Source URL: nicca.nic.in

      Language: English - Date: 2014-06-30 05:31:35
      986Public-key cryptography / E-commerce / Key management / Public key infrastructure / Secure communication / Cryptographic primitive / ID-based encryption / Cryptography / Cryptographic protocol / Zero-knowledge proof / Public key certificate / Digital signature

      ESORICS 2015 Program Guide ESORICS only 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

      Add to Reading List

      Source URL: esorics2015.sba-research.org

      Language: English - Date: 2015-09-22 04:03:47
      987Cryptography / Cloud computing / Key management / Public-key cryptography / Cloud computing security / Computer security / Encryption / Symmetric-key algorithm / Key / Disk encryption / Database encryption

      Microsoft PowerPoint - Copy of slides.ppt

      Add to Reading List

      Source URL: digitalpiglet.org

      Language: English - Date: 2009-11-27 08:33:14
      988Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

      Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

      Add to Reading List

      Source URL: ilia.ws

      Language: English - Date: 2015-09-26 04:23:31
      989Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Certificate authority / DigiCert / Certificate policy / CyberTrust / Public key certificate / X.509

      Microsoft Word - DigiCert_CPS_v408-1-Apr-2015.doc

      Add to Reading List

      Source URL: www.digicert.com

      Language: English - Date: 2016-03-03 14:10:03
      990

      Key Management Interoperability Protocol Profiles Version 1.0 OASIS Standard 01 October 2010 Specification URIs: This Version:

      Add to Reading List

      Source URL: docs.oasis-open.org

      Language: English - Date: 2010-10-14 16:16:00
        UPDATE