OAuth

Results: 220



#Item
201Authentication in the Cloud  Stefan Seelmann Agenda ●

Authentication in the Cloud Stefan Seelmann Agenda ●

Add to Reading List

Source URL: www.stefan-seelmann.de

Language: English - Date: 2013-10-13 10:40:43
202

PDF Document

Add to Reading List

Source URL: firejune.com

Language: English - Date: 2014-08-29 18:28:16
203Version 01 Updated[removed]Paris Time IETF 83 March 25-30, 2012

Version 01 Updated[removed]Paris Time IETF 83 March 25-30, 2012

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2012-03-24 08:15:37
204RFI Comments - Trust Nexus

RFI Comments - Trust Nexus

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 10:38:48
205Package ‘Rfacebook’ July 2, 2014 Title Access to Facebook API via R Description Provides an interface to the Facebook API Version 0.4 Date[removed]

Package ‘Rfacebook’ July 2, 2014 Title Access to Facebook API via R Description Provides an interface to the Facebook API Version 0.4 Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:26:31
206OAuth An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications. OAuth: Open, secure delegation for web services Or, how to authorize access to your accounts wi

OAuth An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications. OAuth: Open, secure delegation for web services Or, how to authorize access to your accounts wi

Add to Reading List

Source URL: wiki.oauth.net

Language: English - Date: 2008-05-09 23:13:03
2070995OS_Practical Data Analysis_Book.indb

0995OS_Practical Data Analysis_Book.indb

Add to Reading List

Source URL: www.packtpub.com

Language: English
208View from the C-Suite  Authentication at Scale Eric Grosse and Mayank Upadhyay | Google Google is investing in authentication using two-step verification via one-time passwords and public-keybased technology to achieve s

View from the C-Suite Authentication at Scale Eric Grosse and Mayank Upadhyay | Google Google is investing in authentication using two-step verification via one-time passwords and public-keybased technology to achieve s

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2013-01-24 15:31:05
209Attribute-Based Credentials for Trust  D2.1 Architecture for Attribute-based Credential Technologies – Version 1 Jan Camenisch, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Kai Rannenberg, Harald Z

Attribute-Based Credentials for Trust D2.1 Architecture for Attribute-based Credential Technologies – Version 1 Jan Camenisch, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Kai Rannenberg, Harald Z

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2012-12-14 04:57:45
210Internet Engineering Task Force (IETF) Request for Comments: 5849 Category: Informational ISSN: [removed]E. Hammer-Lahav, Ed.

Internet Engineering Task Force (IETF) Request for Comments: 5849 Category: Informational ISSN: [removed]E. Hammer-Lahav, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2010-04-20 19:53:50