<--- Back to Details
First PageDocument Content
Cryptography / Smart cards / ISO standards / Ubiquitous computing / Computer access control / Communications security / Public-key cryptography / Subscriber identity module / Encryption / Point to Point Encryption / Contactless smart card
Date: 2015-05-26 20:08:12
Cryptography
Smart cards
ISO standards
Ubiquitous computing
Computer access control
Communications security
Public-key cryptography
Subscriber identity module
Encryption
Point to Point Encryption
Contactless smart card

United States Patent] Chaum

Add to Reading List

Source URL: www.chaum.com

Download Document from Source Website

File Size: 2,55 MB

Share Document on Facebook

Similar Documents

2014 International Conference on Embedded and Ubiquitous Computing Understanding the Dynamic Caches on Intel Processors: Methods and Applications Yi Zhang, Nan Guan Department of Computer Science and Technology Northeas

DocID: 1vn0i - View Document

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

DocID: 1vdXi - View Document

A Survey of Software Infrastructures and Frameworks for Ubiquitous Computing Christoph Endres, German Research Center for Artificial Intelligence, DFKI GmbH, Andreas Butz, Munich University, Germ

DocID: 1uUXQ - View Document

Announcement of an open position at the Faculty of Informatics, TU Wien, Austria FULL PROFESSOR of UBIQUITOUS COMPUTING

DocID: 1ujWS - View Document