Secure

Results: 29781



#Item
631

  Standard:  Authentication  Management     Purpose:   To  establish  minimum  requirements  for  the  secure  use  and  storage  of  authentication  

Add to Reading List

Source URL: it.ufl.edu

Language: English - Date: 2017-09-14 12:20:37
    632

    On the Origin of Trust: Struggle for Secure Cryptography Anne Canteaut Inria, project-team SECRET, Paris, France http://www.rocq.inria.fr/secret/Anne.Canteaut/

    Add to Reading List

    Source URL: www.rocq.inria.fr

    Language: English - Date: 2016-05-10 05:43:56
      633

      RosettaHealth achieves cost-effective Storage Scalability on AWS with Stelligent RosettaHealth is a software company providing solutions for secure, standards-based exchange of healthcare records between organizations us

      Add to Reading List

      Source URL: ww3.hosting.com

      Language: English - Date: 2018-07-01 20:41:16
        634

        Anthony Rebora Managing editor, Education Week Teacher Assistant managing editor, Education Week Follow Anthony on Twitter: @a_rebora

        Add to Reading List

        Source URL: secure.edweek.org

        Language: English - Date: 2016-04-28 14:15:06
          635

          Summer 2018 Locations Offering College Programs Please note: Candidates will be asked to list their preferred location(s), up to three locations, on the application. Hires are responsible for arranging for their own hous

          Add to Reading List

          Source URL: secure.icbdr.com

          Language: English - Date: 2017-12-29 10:02:12
            636

            Two-factor authentication for extra data protection. You can use ESET Secure Authentication for: • Accessing your company’s VPN

            Add to Reading List

            Source URL: cdn1.esetstatic.com

            Language: English - Date: 2017-05-09 05:46:40
              637Cryptocurrencies / Bitcoin / Money / Economy / Cryptography / Alternative currencies / Digital currencies / Blockchains / Multisignature / Mt. Gox / Kraken / Bitcoin IRA Inc

              A Protocol for High-Security Bitcoin Storage Version 0.9 Beta1 ​Beta Release Note:​ ​This protocol is complete, believed to be secure, and is being used today to secure real money.​ However, as this​ is the ini

              Add to Reading List

              Source URL: www.bitcoinarmory.com

              Language: English - Date: 2018-07-31 15:45:25
              638

              Remote Electronic Voting can be Efficient, Verifiable and Coercion-Resistant Roberto Araújo, Amira Barki, Solenn Brunet and Jacques Traoré 1st Workshop on Advances in Secure Electronic Voting Schemes – VOTING’16 Fe

              Add to Reading List

              Source URL: fc16.ifca.ai

              Language: English - Date: 2016-03-02 06:52:40
                639

                RESILIENT TRANSPORT Making transportation networks safe, secure, and reliable Whether they are acting as a connection to crucial services or as life-saving conduits during emergency situations, transport linkages are cri

                Add to Reading List

                Source URL: www.gfdrr.org

                Language: English - Date: 2017-11-27 16:29:17
                  640

                  Post Bases and Post Caps LCE Post Cap Designed to provide a secure connection when the end of a beam bears on a post, the versatile, two‑piece LCE4 can accommodate 90mm or 140mm timber and features a universal design t

                  Add to Reading List

                  Source URL: www.strongtie.com.au

                  Language: English - Date: 2016-07-26 18:20:39
                    UPDATE