Authentication

Results: 7063



#Item
571Computer network security / Directory services / Computer access control / Lightweight Directory Access Protocol / Kerberos / Authentication / Key distribution center

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-10-17 03:55:39
572Computer access control / Identity management / Metadata standards / Signature / Security Assertion Markup Language / EIDAS / Authentication / Password

Security aspects of CLIPS Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-03-07 06:09:16
573Animal anatomy / Reptiles of the Philippines / Sea turtles / Scute / Hawksbill sea turtle / Turtle / Tortoise / Ultraviolet / Plate

Analytical  Imaging  Techniques  for  the  Authentication  of   Tortoise  Shell   Lesley  Day,      UCLA/GeCy  Master’s  Program  in  the  Conserva6

Add to Reading List

Source URL: resources.conservation-us.org

Language: English - Date: 2015-12-31 21:29:20
574Access control / Computer access control / Authentication / Notary / Packaging / Biometrics

Biometric Attendance Authentication System (Nodal Officer User Manual for Transfer) Transfer: Transfer module is used for transfer the employee from one organization/unit to another. Steps for transferring the employee a

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2016-04-29 06:29:36
575Computer access control / Access control / Authentication / Notary / Packaging / Mediascape

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – MediaScape multi-connection mechanisms and multi-device authentication

Add to Reading List

Source URL: www.mediascapeproject.eu

Language: English - Date: 2016-06-20 03:18:25
576Computer access control / HTTP cookie / Authentication / POA

PDF Document

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2009-04-16 04:29:53
577Foreign relations of Canada / Identity document / Canadian nationality law / Czech national identity card / Authentication / Public key certificate / Overseas Citizenship of India

Single Status Submission before ……………….. District Court, Royal Court of Justice: Mr/Ms. …………… Date of Birth ………… Citizenship Identity Card/Passport No ……………….. Father/mother’s

Add to Reading List

Source URL: www.judiciary.gov.bt

Language: English - Date: 2016-07-20 05:57:26
578Gemalto / Secure communication / Cryptography / Computer access control / Computer security / Authentication / Smart card / Online banking / GlobalSign / Gemalto M2M

ROAD TOWARDS MOBILE CREDENTIALS Bring value to students’ life with security Bertrand Michaux April 2016

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
579Cryptography standards / FIPS 140-2 / Cryptographic Module Validation Program / FIPS 140 / Advanced Encryption Standard / Block cipher mode of operation / SHA-1 / Hash-based message authentication code / Cryptographic Module Testing Laboratory / FIPS 140-3

FIPSValidation Process* FIPSSections and Security Levels Security Levels Sections

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-12-09 15:15:24
580Computer network security / Navigation / Global Positioning System / Spoofing attack / GPS signals / Authentication / Satellite navigation / Computer security

15. SCPNT_Coop Authentication_Gao_2014.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2014-11-10 19:11:29
UPDATE