First Page | Document Content | |
---|---|---|
![]() Date: 2012-10-05 00:01:36Cryptography Computer security Computing Computer access control Federated identity Access control Computer network security Electronic authentication Identity management Authentication OpenSSH Application security | Add to Reading List |
![]() | Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methodsDocID: 1tV2t - View Document |
![]() | IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE 1 Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical AtlasDocID: 1rMdy - View Document |
![]() | PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First RespondersDocID: 1rqtN - View Document |
![]() | GAO; Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain RiskDocID: 1rpsj - View Document |
![]() | An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)DocID: 1roee - View Document |