Mobile signature

Results: 68



#Item
1Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2016-08-19 14:59:40
2Transport / Road safety / Land transport / Road transport / Allstate / Mobile phones and driving safety / Text messaging / Adolescence / Texting while driving / Distracted driving

Established in 1952, The Allstate Foundation is an independent, charitable organization made possible by subsidiaries of The Allstate Corporation. Teen safe driving was established as a signature program in 2005 when the

Add to Reading List

Source URL: www.allstatefoundation.org

Language: English - Date: 2016-01-11 06:17:10
3Health / HIV/AIDS / Medicine / HIV/AIDS in South Africa / HIV-positive people / Praekelt Foundation / HIV/AIDS in China / TB Alert

Project Masiluleke A Breakthrough Initiative to Combat HIV/AIDS Utilizing Mobile Technology & HIV Self-Testing in South Africa A signature program of the PopTech Accelerator, Project Masiluleke is a breakthrough crosssec

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-05-11 14:00:57
4Signature / Cryptography standards / Cryptography / Computer law / Regulation / EIDAS / Smart card / Eid / Mobile signature

Austrian eID and its road to eIDAS Herbert Leitold, A-SIT From national eID to eIDAS When Austria introduced its Citizen Card through the

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-14 08:40:58
5Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
6Digital media / Technology / Computing / Mobile phone / New media / Telephony / Email / Signature block

REGISTRATION FORMSCHOOL YEAR R.E.A.D.Y. PROGRAM Student’s Last Name First

Add to Reading List

Source URL: www.readyprogram.org

Language: English - Date: 2014-08-08 15:08:30
7Computer access control / Computer security / Identity / Federated identity / Identity management / Authentication / Security token / Digital identity / OpenID / Phishing / Electronic authentication / Mobile signature

Your Contact is Jason Blum (CEO) +Neunbrunnenstrasse 33 | CH-8050 Zürich www.synacts.com www.digitalid.net

Add to Reading List

Source URL: www.synacts.com

Language: English - Date: 2016-08-02 05:40:35
8Identity management / Computer access control / Computer security / Identity / Electronic identification / Authentication / Mobile signature / Recommender system / Multi-factor authentication / Digital identity / Privacy

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
9Technology / Digital media / Computing / Gladbrook /  Iowa / Post-office box / Email / Mobile phone / ZIP Code / Signature block

Gladbrook Corn Carnival Bean Bag Tournament June 25, 2016

Add to Reading List

Source URL: www.gladbrookcorncarnival.org

Language: English - Date: 2016-04-27 06:32:30
10Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

Keyhub_Technical_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-13 04:56:07
UPDATE