×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [authentication approach]
Documents
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent
218 views
Documents
Why we need a single token for user authentication and how do we get there?
221 views
Technology
Session 7 e_raja_kailar
183 views
Documents
1 J2ME based Authentication Approach for Wireless ISP Environments Christian Ploninger and Norbert Jordan Institute of Communication Networks Vienna University
213 views
Documents
Jonas Thomsen, Ph.d. student Computer Science University of Aarhus
[email protected]
Best Practices and Techniques for Building Secure Microsoft
218 views
Documents
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication
225 views
Documents
User Authentication in Mobile Healthcare Applications
34 views
Documents
Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed email
222 views