Public key fingerprint

Results: 700



#Item
81Biometrics / Fingerprints / Computer network security / Information / Traffic flow / Flow network / Audio watermark detection / Public key fingerprint / IBM Intelligent Printer Data Stream / Computing / Identifiers / Security

The Need for Flow Fingerprints to Link Correlated Network Flows Amir Houmansadr1 and Nikita Borisov2 1 2

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2013-05-06 18:02:18
82Identification / Surveillance / Access control / Fingerprint / Fingers / Human anatomy / Public key fingerprint / Card reader / Operating system / Fingerprints / Security / Biometrics

PDF Document

Add to Reading List

Source URL: www.dermalog.com

Language: English - Date: 2013-05-16 15:18:05
83Identification / Cryptography / Fingerprint recognition / Fingerprint / Public key fingerprint / Authentication / Security / Fingerprints / Biometrics

Microsoft Word - templat.doc

Add to Reading List

Source URL: www.eyenetwatch.com

Language: English - Date: 2010-05-17 10:42:16
84Web of trust / X.509 / Public key fingerprint / Trusted third party / Key authentication / Simple public key infrastructure / Key server / Public key certificate / Certificate authority / Cryptography / Key management / Public-key cryptography

1st Annual PKI Research Workshop---Proceedings Public-key Support for Collaborative Groups Steve Dohrmann, Carl Ellison ,

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2002-08-03 22:47:04
85Access control / Biometrics / Card reader / Multi-factor authentication / FIPS 201 / Authentication / Public key fingerprint / Universal Serial Bus / Smart card / Security / Fingerprints / Identification

Microsoft Word - ma1350.doc

Add to Reading List

Source URL: www.eyenetwatch.com

Language: English - Date: 2010-05-20 07:43:04
86Human–computer interaction / Multimodal interaction / Surveillance / Human anatomy / Identification / Sonification / Public key fingerprint / Touchscreen / Frequency modulation synthesis / Fingerprints / Biometrics / Security

Microsoft Word - Digiti_Sonus_NIME_V26_bhan.docx

Add to Reading List

Source URL: www.mat.ucsb.edu

Language: English - Date: 2013-08-14 21:41:03
87Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
88Identification / Information / Fingerprints / Surveillance / Secure multi-party computation / Fingerprint / Iris recognition / Public key fingerprint / Homomorphic encryption / Biometrics / Security / Cryptography

biom-ident-tech-report.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-16 22:47:34
89Identification / Surveillance / Identity document / Wi-Fi / Public key fingerprint / Automated fingerprint identification / Fingerprints / Security / Biometrics

Компания “СОНДА Технолоджи” расположена в г. Миасс Челябинской области. Имеет собственный офис.

Add to Reading List

Source URL: sonda.ru

Language: English - Date: 2013-11-24 23:56:52
90Identification / Surveillance / Automated fingerprint identification / National Crime Records Bureau / National Automated Fingerprint Identification System / Public key fingerprint / Integrated Automated Fingerprint Identification System / Henry Classification System / Fingerprints / Biometrics / Security

Notice for EoI CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: ncrb.nic.in

Language: English - Date: 2012-01-12 04:02:12
UPDATE