Public computer

Results: 14618



#Item
121Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
122Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
123Cryptography / Signature / Cryptography standards / Computer law / Public-key cryptography / E-commerce / ETSI / Trust service provider / Public key certificate / Electronic signature / X.509 / Common technical regulation

ENV2Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-06-17 07:25:26
124Mathematics / Applied mathematics / Logic / Constraint programming / Operations research / Algorithm / Mathematical logic / Theoretical computer science / Simulated annealing / Local search / Mathematical optimization / Compactness theorem

CrossMark_Color_Stacked_p

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2013-10-29 00:52:29
125Copyleft / Intellectual property law / Law / Public sphere / Open content / Computer law / Public copyright licenses / Creative Commons / Copyright law of the United States / Copyright / Open access

Journal of the Text Encoding Intiative Publication Agreement The language of this publication agreement is based on Stuart Shieber’s model open-access journal publication agreement, version 1.2, available at http://bit

Add to Reading List

Source URL: www.tei-c.org

Language: English - Date: 2014-12-08 12:45:14
126Technology / Digital media / Information technology / Content-control software / Digital rights management / Internet censorship / Internet / Public computer / Acceptable use policy / Child pornography / Public library / Computer Fraud and Abuse Act

INTERNET ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.cumberlandcountypubliclibrary.org

Language: English - Date: 2015-10-28 16:20:05
127Cryptography / Computational complexity theory / Theory of computation / Complexity classes / Probabilistic complexity theory / Public-key cryptography / NP / IP / Proof of knowledge / Zero-knowledge proof / Random oracle / FiatShamir heuristic

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-02-25 05:09:48
128Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Computer security / Public key certificate / Conveyancing / Professional certification / Accreditation / Certificate authority / Information security

Electronic Conveyancing National Law (Victoria) Operating Requirements Determined by the Registrar of Titles Version 3

Add to Reading List

Source URL: www.dtpli.vic.gov.au

Language: English - Date: 2015-09-29 22:03:52
129Computer / Elkhart /  Indiana / Software / Computing / Information technology audit / Technology / Cybercrime / Electrical engineering

Computer User Agreement Elkhart Public Library All people wanting to use the Computer Stations must accept this document. I am using my own library card to access this computer. I understand that if I am using my card to

Add to Reading List

Source URL: www.myepl.org

Language: English - Date: 2015-09-01 17:41:03
130Cryptography / Public key infrastructure / Public-key cryptography / Transport Layer Security / Key management / Computer access control / SOA Security / Security Assertion Markup Language / Revocation list / Online Certificate Status Protocol / WS-Security / Certificate authority

trust claims tokens XML-Encryption

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:27
UPDATE