Public key fingerprint

Results: 700



#Item
61Identification / Surveillance / Automated fingerprint identification / National Crime Records Bureau / National Automated Fingerprint Identification System / Public key fingerprint / Integrated Automated Fingerprint Identification System / Henry Classification System / Fingerprints / Biometrics / Security

Notice for EoI CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: www.ncrb.gov.in

Language: English - Date: 2012-01-12 04:02:12
62Fingers / Human anatomy / Identification / Surveillance / Forensic science / Public key fingerprint / Privacy / Fingerprints / Biometrics / Security

DOC Document

Add to Reading List

Source URL: www.curriculumsupport.education.nsw.gov.au

Language: English - Date: 2006-03-30 16:58:33
63Fingerprints / Chemistry / Biometrics / Security / Virtual screening / Public key fingerprint / Drug discovery / Science / Cheminformatics

Vogt and Bajorath Journal of Cheminformatics 2013, 5(Suppl 1):O5 http://www.jcheminf.com/content/5/S1/O5 ORAL PRESENTATION Open Access

Add to Reading List

Source URL: www.jcheminf.com

Language: English
64Surveillance / Identification / Fingerprint / Human anatomy / Iris recognition / Automated fingerprint identification / Electronic signature / Facial recognition system / Public key fingerprint / Security / Biometrics / Fingerprints

C H A P TE R 13 Biometrics And the Gileadites took the passages of Jordan before the

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 17:55:18
65Key management / Electronic commerce / RSA / Side channel attack / Public key fingerprint / Xen / Ciphertext / CPU cache / Key / Cryptography / Public-key cryptography / Cache

Cross-VM Side Channels and Their Use to Extract Private Keys Yinqian Zhang Ari Juels

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2012-12-24 14:28:56
66Biometrics / Fingers / Human anatomy / Identification / Public key fingerprint / Authentication / Fingerprints / Security / Cryptography

PDF Document

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-24 12:13:22
67Identification / Biometrics / Forensic scientists / Anthropometry / Henry Faulds / Francis Galton / Public key fingerprint / Identity document / Alphonse Bertillon / Fingerprints / Security / British people

fine print by Carolyn Fraser

Add to Reading List

Source URL: www.carolynfraser.com

Language: English - Date: 2012-08-26 20:43:23
68Portable software / Cryptographic protocols / Online chat / Internet privacy / Cryptographic software / Off-the-Record Messaging / Authentication / Public key fingerprint / Pidgin / Software / Cryptography / Computing

A User Study of Off-the-Record Messaging Ryan Stedman Kayo Yoshida Ian Goldberg

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2008-07-15 11:07:12
69Fingers / Human anatomy / Computer graphics / Security / Shall and will / Pixel / Public key fingerprint / Surveillance / Fingerprints / Biometrics / Identification

Ethiopia Revenue and Customs Authority (ERCA) Instructions for completion of Registration Form for Taxpayers Abroad 1. Download the Application Form. ( http://www.erca.gov.et/index.php/citizen_abroad/TIN_registration ) 2

Add to Reading List

Source URL: www.erca.gov.et

Language: English
70Public-key cryptography / Privacy / Human rights / PGP / Bitcoin / Secure communication / Public key infrastructure / HTTP cookie / Public key fingerprint / Cryptography / Internet privacy / Computing

Privacy technologies grad seminar: Online discussion prompts This document lists the online discussion prompts for privacy graduate seminar at Princeton, Fall 2012. See the link for the reading list.

Add to Reading List

Source URL: randomwalker.info

Language: English - Date: 2013-11-14 23:44:26
UPDATE