<--- Back to Details
First PageDocument Content
Smart card / Two-factor authentication / Authentication / Security / ISO standards / Ubiquitous computing
Date: 2013-06-13 05:25:38
Smart card
Two-factor authentication
Authentication
Security
ISO standards
Ubiquitous computing

Risk Based Approach to Protecting Your Business 11 April[removed]

Add to Reading List

Source URL: www.infosec.gov.hk

Download Document from Source Website

File Size: 1,38 MB

Share Document on Facebook

Similar Documents

Non-volatile memory / Computer memory / Computing / Computer hardware / Intel MCS-51 / EEPROM / ALi Corporation / Flash memory / Advanced Encryption Standard

LNCSTTS: High-Speed Signatures on a Low-Cost Smart Card

DocID: 1xTg8 - View Document

PDF Document

DocID: 1wHOM - View Document

PDF Document

DocID: 1wCwi - View Document

Exploiting type systems and static analyses for smart card security Xavier Leroy INRIA Rocquencourt &

DocID: 1vqAs - View Document

Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems

DocID: 1vpVq - View Document