Tokens

Results: 364



#Item
81

Position Paper Advantages of combining a Central Database and Smart Tokens for an EU Entry-Exit programme July 2010

Add to Reading List

Source URL: www.eurosmart.com

Language: English - Date: 2015-10-12 03:45:44
    82

    Spanish-English Code-switching Annotations for Twitter 1. WORD-LEVEL ANOTATIONS Tokens that start with a @ character, urls, emoticons or any token that does not contain any letters such as punctuation marks and numbers (

    Add to Reading List

    Source URL: emnlp2014.org

    Language: English - Date: 2014-08-20 19:32:11
      83Computer access control / Cryptography / Computing / Computer security / YubiKey / PrivacyIDEA / OpenPGP card

      YubiKey NEO • Works instantly with no need to re-type passcodes -replacing SMS texts, authenticator apps, RSA tokens, and similar devices Description:

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-02-04 16:10:41
      84

      Microsoft Word - Ottawa Dairy Tokens final.doc

      Add to Reading List

      Source URL: www.bankofcanadamuseum.ca

      Language: English - Date: 2014-07-03 10:14:41
        85

        Add class“=” attribute to tag of XML output. Add attribute to support Next Generation cloud play-by-play import process. Add shotbyprd attribute to the tag of XML output. Include

        Add to Reading List

        Source URL: grfx.cstv.com

        - Date: 2015-06-29 16:35:21
          86

          Trade and Other Tokens of the Gatineau Region - P

          Add to Reading List

          Source URL: www.bankofcanadamuseum.ca

          Language: English - Date: 2014-08-12 14:18:37
            87Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

            Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2016-05-17 20:42:08
            88

            9 Introduction to Verilog Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. Lexical Tokens

            Add to Reading List

            Source URL: www.cse.wustl.edu

            Language: English - Date: 2006-08-21 14:23:19
              89

              Watermarked tokens and pseudonymity on public blockchains By Tim Swanson Published: November 4, 2015 Abstract Over its nearly seven-year incubation, Bitcoin has attracted a diverse set of entrepreneurs, developers, inves

              Add to Reading List

              Source URL: static1.squarespace.com

              Language: English
                90

                Payment Card Industry (PCI) Additional Security Requirements for Token Service Providers (EMV Payment Tokens) Frequently Asked Questions December 2015

                Add to Reading List

                Source URL: www.pcisecuritystandards.org

                Language: English - Date: 2015-12-10 11:40:53
                  UPDATE