<--- Back to Details
First PageDocument Content
Crimes / ISO standards / Ubiquitous computing / Password / Two-factor authentication / Authentication / One-time password / Smart card / Credit card / Security / Computer security / Cryptography
Date: 2012-02-29 13:44:30
Crimes
ISO standards
Ubiquitous computing
Password
Two-factor authentication
Authentication
One-time password
Smart card
Credit card
Security
Computer security
Cryptography

Add to Reading List

Source URL: www.computer.org

Download Document from Source Website

File Size: 679,29 KB

Share Document on Facebook

Similar Documents

2014 International Conference on Embedded and Ubiquitous Computing Understanding the Dynamic Caches on Intel Processors: Methods and Applications Yi Zhang, Nan Guan Department of Computer Science and Technology Northeas

DocID: 1vn0i - View Document

2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress Buy you

DocID: 1vdXi - View Document

A Survey of Software Infrastructures and Frameworks for Ubiquitous Computing Christoph Endres, German Research Center for Artificial Intelligence, DFKI GmbH, Andreas Butz, Munich University, Germ

DocID: 1uUXQ - View Document

Announcement of an open position at the Faculty of Informatics, TU Wien, Austria FULL PROFESSOR of UBIQUITOUS COMPUTING

DocID: 1ujWS - View Document