Token

Results: 2997



#Item
681String metric / Statistics / Type–token distinction / Jaccard index / Software engineering / Cosine similarity / Lexical analysis / Information science / Measure theory / Information retrieval

1 Extending String Similarity Join to Tolerant Fuzzy Token Matching* JIANNAN WANG, GUOLIANG LI, and JIANHUA FENG Tsinghua University String similarity join that finds similar string pairs between two string sets is an e

Add to Reading List

Source URL: dbgroup.cs.tsinghua.edu.cn

Language: English - Date: 2013-12-23 20:29:19
682USB / Two-factor authentication / ESATAp / Authentication / Security token / Encryption / National Security Agency / Security / National security / Computer security

SECURE SYSTEMS SDV® High Assurance Securing highly classified data in any environment THE SILICON DATA VAULT ® HIGH ASSURANCE (SDV®-HA)SERIES CERTIFIED TO STORE HIGHLY CLASSIFIED DATA UP TO & INCLUDING TOP SECRET WHIL

Add to Reading List

Source URL: www.securesystems.com.au

Language: English - Date: 2015-04-13 10:18:23
683McAfee / Companies listed on the New York Stock Exchange / Password / One-time password / Security token / Two-factor authentication / McAfee VirusScan / Password manager / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:02
684Notary / Packaging / Security token / Security / Access control / Authentication

PDF Document

Add to Reading List

Source URL: wpaa.com.au

Language: English - Date: 2013-10-22 20:49:40
685Identity / Computer network security / Two-factor authentication / Password / Authentication / Virtual private network / Digital identity / Security token / Mobile identity management / Security / Computer security / Identity management

PDF Document

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2015-03-12 04:50:20
686Data transmission / Network congestion / Leaky bucket / TCP congestion avoidance algorithm / Explicit Congestion Notification / Transmission Control Protocol / Token bucket / Queuing delay / Throughput / Network performance / Computing / Management

PDF Document

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2002-09-21 13:43:36
687McAfee / Password / One-time password / Security token / Two-factor authentication / Cryptographic software / McAfee VirusScan / Password manager / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:01
688Cloud clients / Portable software / Computer security / Sandbox / Chromium / Operating system / Kernel / Architecture of Windows NT / Access token / Software / System software / Google Chrome

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:29
689The Tokens / Exonumia / Security token / Tokens / Token coin / Token

PDF Document

Add to Reading List

Source URL: robinupton.com

Language: English - Date: 2008-10-09 14:31:32
690Computing / Integrated Windows Authentication / SPNEGO / Kerberos / NTLM / Active Directory / Windows / Password / Access token / Microsoft Windows / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2011-05-30 04:29:12
UPDATE