Public computer

Results: 14618



#Item
91

Open to the Public July 25 at the Vancouver Convention Centre Go Competition Human vs. Computer

Add to Reading List

Source URL: wcci2016.org

- Date: 2016-05-10 00:37:39
    92Cryptography / Signature / Computer law / Key management / Records management technology / E-commerce / Electronic signature / Digital signature / Public key certificate / Digital Postmarks / EIDAS

    Digital Signing Convenient and Compliant “Electronic signatures and digital signatures are not the same thing” Electronic Signatures

    Add to Reading List

    Source URL: www.securedsigning.co.nz

    Language: English - Date: 2016-08-03 20:04:41
    93Library science / Information science / Technology / Information / Public library / Email / Internet / Library / Digital library / Domain name / Personal computer

    How to request a website from APLS Fill out the attached form and email to

    Add to Reading List

    Source URL: webmini.apls.state.al.us

    Language: English - Date: 2015-06-11 16:44:36
    94Cryptography / Security / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Certificate authority / Public key certificate / Information security / Password

    PEXA Subscriber Security Policy Increment 3 PEXA System Security Policy VersionNovember 2014

    Add to Reading List

    Source URL: www.pexa.com.au

    Language: English - Date: 2016-07-20 01:39:45
    95Software / Computer architecture / System software / Computer science / Computing / Application software / Debian / X Window System / HAL

    www.mtewood.com 2ND POSTING OPEN TO THE GENERAL PUBLIC NOTE: Selection process is in accordance with Chapter 170, as amended. Post Date: July 5, 2016

    Add to Reading List

    Source URL: mtewood.com

    Language: English - Date: 2016-07-05 16:38:43
    96Security / Cyberwarfare / Computing / Public-key cryptography / Resource Public Key Infrastructure / Cryptography / Netnod / Computer security / Vulnerability

    Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2010-07-25 05:37:06
    97Cryptography / Public-key cryptography / Key management / Public key infrastructure / Computer access control / E-commerce / One-time password / Certificate authority / Internet Explorer / Public key certificate / Password / Security and safety features new to Windows Vista

    FAQs: Digital Certificate Service    

    Add to Reading List

    Source URL: myexostar.com

    Language: English - Date: 2016-06-17 15:09:11
    98Cryptography / Computer security / Computer access control / Certificate authorities / Identity management / Public-key cryptography / Federated identity / EBAM / IdenTrust / Authentication / Digital identity / Multi-factor authentication

    Accountability – The Key to Expanding Global Commerce p9.ai

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:41
    99Cryptography / Signature / Computer law / Cryptography standards / Key management / E-commerce / Public key certificate / Electronic signature / Professional certification / Digital signature / ZertES / Trust service provider

    Law_on_Electronic_Signature

    Add to Reading List

    Source URL: www.nekretnine.co.me

    Language: English - Date: 2013-07-17 07:56:10
    100Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

    A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

    Add to Reading List

    Source URL: scpnt.stanford.edu

    Language: English - Date: 2009-10-27 13:42:56
    UPDATE