Public computer

Results: 14618



#Item
131Library science / Personal computing / Public library / Tablet computer / Library / Internet privacy / Computing / Sumter County Library /  FL / Professional studies / Technology

Abington Public Library Young Adult Internet and Library Owned Computer Tablet Use Policy The Abington Public Library endeavors to develop collections, resources and services that meet the informational, educational, cul

Add to Reading List

Source URL: www.abingtonpl.org

Language: English - Date: 2015-11-03 15:58:49
132Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English
133Notary / Law / Common law / Comparative law / Notary public / Affidavit / Sons of the Revolution / Birth certificate

General Instruction Sheet Save this file on your computer. Save and rename the file and and then begin completing the application form. If you run into problems or loose the file you are working on open the origina

Add to Reading List

Source URL: sril.gradeless.com

Language: English - Date: 2016-05-10 21:17:03
134Free and open-source software licenses / Computer law / Free software / Law / Contract law / Open content / Software licenses / Copyleft / License / Implied warranty / Proprietary software / Public copyright license

License Agreement Software-Engineering Fichtner/Weisser GbR The REFLECTK software products (from now on called „software“) are protected by

Add to Reading List

Source URL: www.reflectk.com

Language: English - Date: 2013-02-06 22:28:29
135Graphics file formats / Computing / Computer graphics / ISO standards / Vector graphics / Electronic documents / Adobe Systems / Communication design / PDF/X / ICC profile / Dots per inch / Portable Document Format

P3 Material Specs 2016 Public-Private Partnerships Guide Print Ads IMPORTANT

Add to Reading List

Source URL: media.navigatored.com

Language: English - Date: 2016-03-22 12:24:12
136Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
137Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
138Computing / Computer security / Computer access control / Computer network security / Wireless networking / Extensible Authentication Protocol / IEEE 802.1X / RADIUS / Authentication / Mutual authentication / Supplicant / Single sign-on

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
139Software / Computing / Digital media / Social media / Social networking services / New media / Web 2.0 / Economy of Oregon / Pacific Northwest Economic Region / Twitter / Computer security

1 Social Media Grant  FEMA Port Security Grant, FY08 & FY12, Enhancing Maritime Security by Engaging Emergency Preparedness/Response Partners and the Public

Add to Reading List

Source URL: www.regionalresilience.org

Language: English - Date: 2016-04-26 13:56:02
140Cryptography / Computing / Transport Layer Security / Key management / Public-key cryptography / Hypertext Transfer Protocol / Computer network security / HTTPS / Man-in-the-middle attack / Browser security / Public key certificate / Public key infrastructure

Improving the Usability of Web Browser Security Haidong Xia and Jose´ Carlos Brustoloni Department of Computer Science, University of Pittsburgh {hdxia,jcb}@cs.pitt.edu ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:18
UPDATE