E-Control

Results: 9336



#Item
441Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
442Law enforcement / National security / Security / Mass surveillance / Counter-terrorism / Terrorism / E-Borders / Association of Chief Police Officers / National Security Agency / UK immigration control - history

Draft Regulatory Impact Assessment Police and Justice Bill: Data Capture 1. Title of Proposal Enhanced powers to enable the Police to capture passenger and crew data on air and sea journeys within the UK.

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2008-05-27 07:33:20
443Agricultural pest insects / Diaprepes abbreviatus / Entiminae / Biological pest control / Citrus / Weevil / Phyllocnistis citrella / Citrus production / Hylobius abietis

2016 FLORIDA CITRUS PEST MANAGEMENT GUIDE: Citrus Root Weevils1 L.W. Duncan, M.E. Rogers, S.H. Futch, and J.H. Graham2 Citrus root weevils represent a complex of species known to infest citrus trees and various alterna

Add to Reading List

Source URL: www.crec.ifas.ufl.edu

Language: English - Date: 2016-04-14 11:06:36
444Computer access control / Password / Security / Login / Identity management / Self-service password reset / Password strength

Guided instructions for eL-Users of EAC, on how to activate their eL-User Accounts by using their ‘pre-assigned eL-Login Name’ in the EAC eLearning System: How to start the EAC e-Learning System: • Open ‘Mozilla

Add to Reading List

Source URL: www.eac.edu.ph

Language: English - Date: 2015-06-30 07:19:00
445Plant reproduction / Cantharellales / Botany / Plant sexuality / Seed / Hypocotyl / Rhizoctonia / Fungicide use in the United States / Rhizoctonia solani

SEED DRESSING FUNGICIDE Te c h N o t e Rovral Liquid Seed Dressing Stops Spot and Rot in Lupins Rovral® Liquid Seed Dressing is a seed treatment fungicide for the control of brown spot (Pleiochaeta setosa) and the supp

Add to Reading List

Source URL: www.fmccrop.com.au

Language: English - Date: 2015-06-11 20:42:48
446Invoice / Corporate finance / Accounts payable / Payment / Cheque / Value-added tax / Electronic invoicing / Invoice processing

Invoice Payments The use of e²gen’s Invoice Payment (IP) module allows an institution to control the lifecycle of invoices and credit notes segregated by department with full integration to your accounting system. Fun

Add to Reading List

Source URL: www.aqua-global-solutions.com

Language: English - Date: 2016-03-24 08:17:18
447Environment of California / California Department of Toxic Substances Control / Atchison /  Topeka and Santa Fe Railway / Brownfield land

D E PA R T M E N T o f T O X I C

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2015-09-28 14:06:24
448Theoretical computer science / Quantum computing / Quantum information science / Computational complexity theory / Quantum algorithm / Algorithm / Computational geometry / Computational mathematics / Complexity / Quantum simulator / Art gallery problem

CEOC Centro de Estudos em Optimização e Controlo (Centre for Research in Optimization and Control) Computability and Algorithms

Add to Reading List

Source URL: ceoc.mat.ua.pt

Language: English - Date: 2008-07-17 10:24:20
449Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
450Coal mining in the United States / 95th United States Congress / Environment / Surface Mining Control and Reclamation Act / Surface mining / Office of Surface Mining / International Mayor Communication Centre / United States Environmental Protection Agency / Mining / Regulatory Flexibility Act / Rulemaking / Mine reclamation

“The Interstate Mining Compact Commission: Seeking to Secure State Sovereignty in the Minerals Arena” Presented by Gregory E. Conrad

Add to Reading List

Source URL: www.imcc.isa.us

Language: English - Date: 2014-01-27 12:37:43
UPDATE