×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [access authentication]
Home >
access authentication
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Attacks
134 views
Network Attached Storage (NAS) Initiative
737 views
SWRL Tutorial 01
144 views
Basic Training on IPTV Solution Summary
163 views
A Single Strong Authentication Platform for Cloud and On-Premise Applications
629 views
New Banking to the Unbanked
539 views
Efficiently Querying Relational Databases using OWL and SWRL Martin OConnor Stanford Medical Informatics, Stanford University.
214 views
1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-09-0014-00-0sec Title: Security Group TR Date Submitted: 20 th January, 2009 Presented at IEEE 802.21.
214 views
21-07-0xxx-00-00001 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0xxx-00-0000 Title: Proposal for adding a key hierarchy based approach in the security.
215 views
21-07-0297-00-00001 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0297-00-0000 Title: Possible MIH security approaches and issues Date Submitted: September.
215 views
Jumpstart Azure
1.191 views
An Overview of Windows Azure
3.310 views
Next >