Multi-access key

Results: 41



#Item
1

Phoenix Q2 Regional Profile Multi-Model Access to Key Western Markets From PHX Union Pacific Rail Accessible and 1-10 Accessible INDUSTRIAL MARKET OVERVIEW

Add to Reading List

Source URL: www.corfac.com

- Date: 2016-07-19 12:29:57
    2Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

    plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

    Add to Reading List

    Source URL: planc.biz

    Language: English - Date: 2011-01-27 05:18:57
    3Cryptography / Computer security / Computer access control / Certificate authorities / Identity management / Public-key cryptography / Federated identity / EBAM / IdenTrust / Authentication / Digital identity / Multi-factor authentication

    Accountability – The Key to Expanding Global Commerce p9.ai

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:41
    4Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

    Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    5Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

    EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

    Add to Reading List

    Source URL: www.cec.uchile.cl

    Language: English - Date: 2012-02-11 16:01:44
    6Computer access control / Identity management / Federated identity / Security token / Mobile signature / Password / Authentication / Public key infrastructure / Multi-factor authentication / Mobile identity management / OpenID / Subscriber identity module

    Keyhub_Technical_Overview_28

    Add to Reading List

    Source URL: www.iquestgroup.com

    Language: English - Date: 2016-05-13 04:56:07
    7Public-key cryptography / Key management / Computer access control / Transport Layer Security / Public key infrastructure / Certificate authority / Smart card / Java / Multi-factor authentication / Authentication / Man-in-the-browser / Public key certificate

    PDF Document

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2014-04-24 20:51:56
    8Taxonomy / Animal identification / Citizen science / Bioinformatics / Data management / Identification key / Field guide / EBird / Biodiversity informatics / Cornell Lab of Ornithology / Automated species identification / Multi-access key

    Professional Biologist Next-Generation Field Guides ELIZABETH J. FARNSWORTH, MIYOKO CHU, W. JOHN KRESS, AMANDA K. NEILL, JASON H. BEST, JOHN PICKERING, ROBERT D. STEVENSON, GREGORY W. COURTNEY, JOHN K. V AN DYK, AND AAR

    Add to Reading List

    Source URL: www.discoverlife.org

    Language: English - Date: 2013-11-06 13:13:56
    9Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

    Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2016-05-19 18:55:28
    10Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

    The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    UPDATE