×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [identity authentication]
Home >
identity authentication
telco20 : Two-sided Telecoms Business Models
2.992 views
XO Laptop Software Roadmap (Kim Quirk)
1.652 views
Being HAPI! Reverse Proxying on Purpose
1.035 views
The News Release in the Social Media Era
3.485 views
Yared Hankins Wireless Key
214 views
Copyright, 1995-2006 1 Information Security Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
219 views
Handle Client - Java Version Sean Reilly
[email protected]
.
226 views
Secure System Design and Access Control Nick Feamster CS 6262 Spring 2009.
218 views
Access Control Jason Crampton 14 October 2002. Overview Introduction to access control and access control structures Partial orders, lattices and their.
217 views
Mano ‘dash4rk’ Paul October 11, 2013 Seek and Ye shall Find - Password and Providence.
213 views
Chapter 6 overview
253 views
ICAM (Identity, Credential and Access management)-OpenID 2.0 Profile
304 views
Next >