<--- Back to Details
First PageDocument Content
Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption
Date: 2016-05-10 04:15:28
Computer access control
Public-key cryptography
Identity management
Mobile signature
Signature
Security token
Public key infrastructure
Authentication
3-D Secure
Electronic authentication
Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Download Document from Source Website

File Size: 1,07 MB

Share Document on Facebook

Similar Documents

Cryptography / Elliptic curve cryptography / Public-key cryptography / Elliptic Curve Digital Signature Algorithm / Electromagnetic attack / Digital Signature Algorithm / Digital signature / RSA / OpenSSL / Scalar / Matrix / Random number generator attack

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels ∗ Daniel Genkin Lev Pachmanov

DocID: 1qPjA - View Document

Transport / Road safety / Land transport / Road transport / Allstate / Mobile phones and driving safety / Text messaging / Adolescence / Texting while driving / Distracted driving

Established in 1952, The Allstate Foundation is an independent, charitable organization made possible by subsidiaries of The Allstate Corporation. Teen safe driving was established as a signature program in 2005 when the

DocID: 1qM4t - View Document

Health / HIV/AIDS / Medicine / HIV/AIDS in South Africa / HIV-positive people / Praekelt Foundation / HIV/AIDS in China / TB Alert

Project Masiluleke A Breakthrough Initiative to Combat HIV/AIDS Utilizing Mobile Technology & HIV Self-Testing in South Africa A signature program of the PopTech Accelerator, Project Masiluleke is a breakthrough crosssec

DocID: 1qBNa - View Document

Signature / Cryptography standards / Cryptography / Computer law / Regulation / EIDAS / Smart card / Eid / Mobile signature

Austrian eID and its road to eIDAS Herbert Leitold, A-SIT From national eID to eIDAS When Austria introduced its Citizen Card through the

DocID: 1qk3A - View Document

Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

DocID: 1qep0 - View Document