Multi-access key

Results: 41



#Item
31Two-factor authentication / Anakam / Authentication / Multi-factor authentication / Agnitio / Keystroke dynamics / Security / Access control / Biometrics

Progressive Authentication — Voice Biometrics Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS)

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
32Antibiotic-resistant bacteria / Health / Medicine / Health in India / Multi-drug-resistant tuberculosis / Biology / Tuberculosis / Pharmacopoeias / United States Pharmacopeia

FOR IMMEDIATE RELEASE CONTACT: Anne Bell[removed]; [removed] USP Helps Expand Worldwide Access to Key Tuberculosis Drugs

Add to Reading List

Source URL: www.usp.org

Language: English - Date: 2014-06-10 10:25:24
33Advantage / Search engine indexing / Access token / Cryptography / Information science / Public-key cryptography

Multi-Key Searchable Encryption Raluca Ada Popa and Nickolai Zeldovich MIT CSAIL Abstract We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is pra

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
34Hayward /  California / Parking / Hayward / California State University /  East Bay / Multi-storey car park / University / Geography of the United States / Geography of California / American Association of State Colleges and Universities / Transport

7 | Access, Circulation and Parking Framework The key factors affecting transportation systems on the Cal State East Bay Hayward campus are topography and transit accessibility. Topography limits the practicality of bic

Add to Reading List

Source URL: www20.csueastbay.edu

Language: English - Date: 2014-09-08 06:16:45
35Third country relationships with the European Union / Sociology / European Union / Federalism / Political philosophy

Western Europe Multi Sector Business Development Mission MARCH 31 – APRIL 4, 2014 • UNITED KINGDOM, FRANCE & OPTIONAL 3RD STOP Visit some of the largest economies in the world, with key access to other European marke

Add to Reading List

Source URL: mississippi.org

Language: English - Date: 2013-12-04 15:48:09
36Secret sharing / Cloud computing / Secure multi-party computation / Access structure / Yvo G. Desmedt / Cryptography / Cryptographic protocols / Key management

CETA Workshop–November 2011-Secret Sharing and Reliable Cloud Computing

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:13:20
37Software token / Access token / Key generation / Cryptography / Key management / Public-key cryptography

nFast Cryptographic accelerators security policy nFast Cryptographic accelerators security policy nFast 75/KM-1C, nFast 150/KM-1C, nFast 300/KM-1C Purpose The nFast accelerator is a multi-tasking hardware accelerator th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
38Key generation / Access token / Public-key cryptography / Key / Cryptography / Key management / Software token

nFast Cryptographic accelerators security policy nFast Cryptographic accelerators security policy nFast 75/CA-1C, nFast 150/CA-1C, nFast 300/CA-1C Purpose The nFast accelerator is a multi-tasking hardware accelerator th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
39Cryptography / Software token / Access token / Key generation / Cyberwarfare / Key management / Security / Computer security

nFast Cryptographic accelerators security policy nFast Cryptographic accelerators security policy nFast 75/KM-00, nFast 150/KM-00, nFast 300/KM-00 Purpose The nFast accelerator is a multi-tasking hardware accelerator th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
40Cryptography / Software token / Access token / Key generation / Cyberwarfare / Hardware security module / PKCS11 / Key management / Security / Computer security

nFast Cryptographic accelerators security policy nFast Cryptographic accelerators security policy nFast 75/CA-00, nFast 150/CA-00, nFast 300/CA-00 Purpose The nFast accelerator is a multi-tasking hardware accelerator th

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE