Key authentication

Results: 993



#Item
881Public-key cryptography / Counterfeit consumer goods / Authentication / Packaging / Digital signature / Counterfeit / Signature / Radio-frequency identification / Packaging and labeling / Cryptography / Security / Notary

Protection against counterfeit medicines by means of digital signatures Submitted as a contribution in response to the European Commission’s public consultation in preparation of a legal proposal to combat counterfeit

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-10-09 09:04:06
882Network switching subsystem / Phone cloning / Cryptographic protocols / Mobile identification number / Public-key cryptography / GSM / Subscriber identity module / Authentication / International Mobile Subscriber Identity / Cryptography / Technology / Security

Security and Privacy in Wireless Systems Professor Randy H. Katz CS Division University of California, Berkeley Berkeley, CA[removed]

Add to Reading List

Source URL: bnrg.eecs.berkeley.edu

Language: English - Date: 1996-04-02 16:46:32
883Man-in-the-middle attack / Key exchange / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Security Issues in a CDPD Wireless Network by Yair Frankel, et. al. Summarized by Johnathan M. Reason CS294-7 Lecture Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: bnrg.eecs.berkeley.edu

Language: English - Date: 1996-04-16 10:49:00
884Access control / Authentication / Notary / Packaging / Public key certificate / Cryptography / Electronic commerce / Public-key cryptography

TUPAS Identification Service for Service Providers Service Description and Service Provider’s Guidelines Version 2.3c 20 January 2011

Add to Reading List

Source URL: www.fkl.fi

Language: English - Date: 2011-04-19 06:21:51
885Digital Cinema Package / Digital cinema / Digital Cinema Initiatives / X.509 / Public key certificate / XML / Authentication / Cryptography / Digital media / Public-key cryptography

Digital Cinema System Specification - Compliance Test Plan

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2012-10-12 00:31:36
886Internet protocols / Internet standards / Network management / Network protocols / RADIUS / Management information base / IPv6 / Extensible Authentication Protocol / IP multicast / Network architecture / Computing / Internet

Data sheet HP[removed]20G Unified Wired-WLAN Module Key features

Add to Reading List

Source URL: h17007.www1.hp.com

Language: English - Date: 2013-05-09 08:56:48
887Computing / Key management / Public-key cryptography / Public key certificate / Domain name / Domain registration / Email authentication / Domain name system / Internet / Email

Active-Server.com Administrative Email Address Change Fax: [removed]Email: [removed] Instructions:

Add to Reading List

Source URL: www.active-server.com

Language: English - Date: 2013-05-23 15:38:09
888Cryptographic protocols / Email authentication / Email / S/MIME / X.509 / Email client / Public key certificate / Certificate authority / GlobalSign / Cryptography / Public-key cryptography / Key management

Microsoft Word - SMIME Guide for SI.doc

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-10-13 10:44:35
889Email authentication / Computer security / S/MIME / Digital signature / XML / Cryptography / Public-key cryptography / Key management

Projet Labo: Spécification de la modification du système de résultats Author : Nicolas Hoffmann Version 1.0en Date : 15 Décembre 2004

Add to Reading List

Source URL: www.sante.public.lu

Language: English - Date: 2012-10-13 04:16:36
890Human interface device / Globally unique identifier / USB / Computing / Universal Serial Bus / USB flash drive / XTEA

TEAleaf-USB TM Micro-Sized, Ultra-Low Cost USB Authentication Key for Software Licensing

Add to Reading List

Source URL: flexipanel.com

Language: English - Date: 2009-04-15 15:57:43
UPDATE