×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [identity of user]
Home >
identity of user
Virtual Windows: Observing Chat Reference Encounters through Transcript Analysis Lynn Silipigni Connaway, Ph.D., Marie L. Radford, Ph.D. Lawrence Olszewski,
215 views
KERBEROS LtCdr Samit Mehra (05IT 6018). What is Kerberos? Motivation Why Kerberos? Firewall Vs Kerberos Kerberos assumptions How does Kerberos work? Weakness.
235 views
Single Sign On
124 views
Biometric authentication system in business
38 views
Trusted Electronic Transactions. Why conduct transactions electronically? Three Characteristics that ensure trust in electronic transactions How.
224 views
Encryption and Secure Computer Networks Brady Chen Andriy Baranskyy Trevor Owen (11.07.2006)
221 views
Private Information Retrieval Amos Beimel – Ben-Gurion University beimel Tel-Hai, June 4, 2003 This talk is based on talks by:
216 views
Private Information Retrieval Yuval Ishai Computer Science Department Technion.
217 views
Private Information Retrieval Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last.
214 views
Tangible Interfaces for Non-Literate Rural Communities Message in a Bottle. Weather Tank.
218 views
Shibboleth 2.0 : An Overview for Developers
16 views
Private Information Retrieval
36 views
Next >