×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [authentication approach]
Home >
authentication approach
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
216 views
Session 7 e_raja_kailar
177 views
1 J2ME based Authentication Approach for Wireless ISP Environments Christian Ploninger and Norbert Jordan Institute of Communication Networks Vienna University.
212 views
Jonas Thomsen, Ph.d. student Computer Science University of Aarhus
[email protected]
Best Practices and Techniques for Building Secure Microsoft.
218 views
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
217 views
User Authentication in Mobile Healthcare Applications
31 views
Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed email.
218 views