×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [authentication approach]
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent
218 views
Why we need a single token for user authentication and how do we get there?
221 views
Session 7 e_raja_kailar
184 views
1 J2ME based Authentication Approach for Wireless ISP Environments Christian Ploninger and Norbert Jordan Institute of Communication Networks Vienna University
213 views
Jonas Thomsen, Ph.d. student Computer Science University of Aarhus
[email protected]
Best Practices and Techniques for Building Secure Microsoft
218 views
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication
225 views
User Authentication in Mobile Healthcare Applications
34 views
Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed email
222 views