First Page | Document Content | |
---|---|---|
Date: 2016-03-09 10:47:55Computer access control Computer security Cryptography Technology Multi-factor authentication Authentication Smart card Mobile phone Truphone Subscriber identity module Electronic authentication Security token | ConsentID_datasheet1.inddAdd to Reading ListSource URL: www.aeteurope.comDownload Document from Source WebsiteFile Size: 3,50 MBShare Document on Facebook |
Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methodsDocID: 1tV2t - View Document | |
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE 1 Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical AtlasDocID: 1rMdy - View Document | |
PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First RespondersDocID: 1rqtN - View Document | |
GAO; Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain RiskDocID: 1rpsj - View Document | |
An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)DocID: 1roee - View Document |