Authentication

Results: 7063



#Item
381Computer access control / Computer security / Access control / Password / Security / Login / Transaction authentication number / Self-service password reset / Password manager

Online Grant Reporting System Instructions This document provides instructions for logging into the Foundation’s online reporting system and submitting reports. Please do not send an additional paper copy of your repor

Add to Reading List

Source URL: www.skillman.org

Language: English - Date: 2016-07-14 16:02:39
382Working groups / IEEE 802 / Computing / IEEE standards / Network architecture / IEEE Standards Association / Piscataway /  New Jersey / Institute of Electrical and Electronics Engineers / Audio Video Bridging / WLAN Authentication and Privacy Infrastructure

IEEE P802.11 Wireless LANs Minutes of IEEE 802 JTC1 Standing Committee in San Diego, US in Jul 2016 Date:

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2016-08-09 03:42:03
383

XignQR The Quick Response Authentication & Signature System XignSYS – the X in Signatures

Add to Reading List

Source URL: www.xignsys.com

Language: German - Date: 2016-03-13 15:17:18
    384Humanities / Information science / Information technology / Museology / Archival science / Standards organizations / Data management / Evidence law / Provenance / Fast Healthcare Interoperability Resources / Health Level 7 / Authentication

    Extending the FHIR standard to handle provenance John Moehrke Arnon Rosenthal Adriane Chapman

    Add to Reading List

    Source URL: provenanceweek.org

    Language: English - Date: 2016-06-01 16:12:30
    385Computer access control / Computer security / Security / Authentication / Authorization / Identity provider

    Welcome! Qasim Sarfraz Our Services AMPRID

    Add to Reading List

    Source URL: www.se.ampr.org

    Language: English - Date: 2016-04-25 08:47:20
    386Batch file / International Standard Book Number / Publishing / Transaction authentication number / Software / Computing

    Microsoft Word - How to use Batch Returns.doc

    Add to Reading List

    Source URL: www.batch.co.uk

    Language: English - Date: 2014-05-23 08:45:54
    387Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

    Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-27 10:26:48
    388Politics and technology / Surveying / Technology / Computing / Computer access control / Central processing unit / Real property law / Public administration / Cadastre / Processor register / Electronic authentication / Land registration

    Cadastre as pivotal key register in national and European eGovernement Martin Salzmann Cadastre, Land Registry and Mapping

    Add to Reading List

    Source URL: en.foldhivatal.hu

    Language: English - Date: 2011-06-14 14:16:30
    389Economy / Economy of the European Union / Finance / Money / Eurozone / Fiscal policy / International taxation / Public finance / Euro / Transaction authentication number / Government debt / Austerity

    real-world economics review, issue no. 71 subscribe for free A program proposal for creating a complementary currency in Greece Trond Andresen and Robert W. Parenteau

    Add to Reading List

    Source URL: www.paecon.net

    Language: English - Date: 2015-05-28 06:00:43
    390Computer access control / Computer security / Cryptography / Security / Password / Authentication / Login

    FAQs for digital science online Q. What browsers work best with Digital Science Online?

    Add to Reading List

    Source URL: s3.amazonaws.com

    Language: English - Date: 2015-02-05 15:05:36
    UPDATE