Browse
Contact
/
Login
Upload
Search Results for 'Armchair Authentication Karen'
Authentication of honeys of different floral origins
tatyana-admore
Ration cards – Reaching the needy
briana-ranney
Cross Platform Mobile Backend with Mobile Services
liane-varnes
Microsoft SDL Threat Modeling
natalia-silvester
Computer Security Damian Gordon
ellena-manuel
Computer Security Damian Gordon
faustina-dinatale
Federated Identity
marina-yarberry
REST/SOAP Security A Brief Introduction
pasty-toler
Physical Security
karlyn-bohler
EVIDENTIARY ISSUES WITH SOCIAL MEDIA
tatiana-dople
Using Claims based authentication with SharePoint
ellena-manuel
Cloud privacy and security
cheryl-pisano
Chapter 12: Authentication
stefany-barnette
(SAML) Single Sign-On (SSO) for Cisco Unified Communications 10.x
phoebe-click
Unified Communications:
tatiana-dople
Mobile Working Group Session
min-jolicoeur
A Study of the Channel Mismatch Problem in
cheryl-pisano
Securing Rich Client Applications Using OAuth 2.0 and Windo
lindy-dunigan
Security Analysis of a Single Sign-On Mechanism for Distrib
stefany-barnette
Method of providing Secure Network Channel among Secure OSs
calandra-battersby
Private Eyes:
phoebe-click
JTLS 5.1 Online Game Joel
tawny-fly
SafeNet MobilePKI for BlackBerry
marina-yarberry
CLARIN Infrastructure Vision
trish-goza
24
25
26
27
28
29
30
31
32
33
34