Public key fingerprint

Results: 700



#Item
101Identification / Access control / Fingerprint recognition / Fingerprint / BioAPI / Public key fingerprint / Hand geometry / Authentication / Fingerprint Verification Competition / Security / Biometrics / Fingerprints

SecuGen® USB Fingerprint Reader User Guide Installation, Usage, Care and Troubleshooting SG1-0007B[removed]) © Copyright[removed]SecuGen Corporation.

Add to Reading List

Source URL: www.secugen.com

Language: English - Date: 2014-01-28 20:13:32
102Computing / Secure Shell / Ssh-keygen / OpenSSH / Public key fingerprint / Domain Name System / Comparison of SSH servers / Cryptographic software / System software / Software

SSH Fingerprints in the Domain Name System November[removed]removed]

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2007-05-16 08:17:23
103Identification / Surveillance / Fingerprints / Authentication / Password / IPhone / Public key fingerprint / Facial recognition system / Iris recognition / Security / Biometrics / Cryptography

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe†, Lorrie Faith Cranor, Marios Savvides Carnegie Mellon

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2015-01-16 16:24:14
104Cryptographic hash functions / File sharing networks / Computing / Security / Fingerprint / Identifiers / Public key fingerprint / Peer-to-peer / Hash list / Hashing / Cryptography / Error detection and correction

Multimedia Systems DOI[removed]s00530[removed]REGULAR PAPER Privacy-aware peer-to-peer content distribution

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2013-05-22 08:58:22
105Fingers / Human anatomy / CCNet / Dr. Tran / Oning / Public key fingerprint / Security / Surveillance / Information / Biometrics / Fingerprints / Identification

Presented by the CS Division   Loca on fingerprint is a common approach to GPS‐less localiza on. In this approach, for good  accuracy, the training set of sample fingerprints should be sufficie

Add to Reading List

Source URL: www.eecs.ucf.edu

Language: English - Date: 2014-10-13 13:52:28
106Identification / Surveillance / Cryptography / Human anatomy / Facial recognition system / Public key fingerprint / Authentication / Integrated Automated Fingerprint Identification System / Automated fingerprint identification / Security / Fingerprints / Biometrics

PositiveID+ Valuable Results PositiveID+ offers

Add to Reading List

Source URL: www.dynamicimaging.com

Language: English - Date: 2012-04-16 11:18:46
107Cryptography / Identification / Fingerprint / Fingers / Human anatomy / Public key fingerprint / Authentication / Fingerprint Verification Competition / Fingerprints / Security / Biometrics

INTERNET TRANSACTION SECURITY WITH FINGERPRINT RECOGNITION Sagar Nilesh Shah, Kannan Chandrasegaran, Saurabh Swarup & Shrikant Patnaik Supervised By - Prof. Cunsheng Ding (CSE) & Prof. Bing Zeng (ECE) Project Overview

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-08-24 04:50:26
108Security / Fingerprint / Fingers / Human anatomy / Identification / Public key fingerprint / Ultraviolet / Physical Unclonable Function / Minutiae / Biometrics / Cryptography / Fingerprints

Anti-counterfeit polymers work like fingerprints

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-04-17 05:31:11
109Cryptography / Fingerprints / Fingerprint / Fingers / Human anatomy / Authentication / Public key fingerprint / Two-factor authentication / Security / Biometrics / Identification

ITU-T Workshop on Security, Seoul Importance of Open Discussion on Adversarial Analyses for Mobile Security Technologies --- A Case Study for User Identification --14 May 2002

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2003-11-20 14:39:09
110Biometrics / Immigration / Fingerprint / Human anatomy / Immigration officer / Public key fingerprint / Leave to enter / Immigration to the United Kingdom / Security / Identification

Statutory Document No[removed]NATIONALITY, IMMIGRATION AND ASYLUM ACT 2002 IMMIGRATION (PROVISION OF PHYSICAL DATA) REGULATIONS 2008 15th April[removed]Laid before Tynwald

Add to Reading List

Source URL: www.gov.im

Language: English - Date: 2013-09-25 06:13:26
UPDATE