Access token

Results: 765



#Item
541Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: kambing.ui.ac.id

Language: English - Date: 2014-09-06 04:58:27
542Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirrors.ustc.edu.cn

Language: English - Date: 2014-09-06 03:58:00
543Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirrors.hustunique.com

Language: English - Date: 2014-09-06 03:58:00
544Compiler construction / Lexical analysis / Parsing / Programming language implementation / Access token / Java / Computing / Software engineering / Software

Additional NLS Tools • • • •

Add to Reading List

Source URL: lexsrv3.nlm.nih.gov

Language: English - Date: 2009-11-23 15:35:20
545Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirror.hmc.edu

Language: English - Date: 2014-09-06 04:58:27
546Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ftp.fernuni-hagen.de

Language: English - Date: 2014-09-06 04:58:27
547Authentication / Notary / Packaging / Computer security / Biometrics / Access token / Two-factor authentication / Identity assurance / Security / Identity management / Access control

Challenge & Response within E-Authentication Framework NIST Symposium February 9, [removed]February 10, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
548Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ftp.eq.uc.pt

Language: English - Date: 2014-09-06 03:58:00
549Access control / Electronic authentication / Authentication / Password / One-time password / Two-factor authentication / Security token / Security / Identity management / Computer security

NIST E-Authentication Guidance: Can we add KBA? NIST KBA Symposium Feb. 9, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
550Access control / Electronic authentication / Two-factor authentication / Security token / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

[removed][removed][removed]New York State Information Technology Standard No: NYS-S13-004

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-06-26 10:22:41
UPDATE