Browse
Contact
/
Login
Upload
Search Results for 'Authentication And Encryption'
SafeNet Authentication Service:BLE, LEXIBLE, AUTHENTICChoosing the rig
alida-meadow
Automatic Encryption for Sensitive Email Communications
giovanna-bartolotta
Public Key Encryption
natalia-silvester
Cued click point technique for graphical password authentication
test
UsingSecureCoprocessorsBennetYeeMay1994CMU-CS-94-149SchoolofComputerSc
test
istratorsrestrictunwantedcommunicationswithcoarse-grainedrewallpolici
tawny-fly
Why Johnny Still Cant Encrypt Evaluating the Usability of Email Encryption Softw
sherrill-nordquist
ObfuscatingMany-to-oneFunctionalRe-encryption,anditsConnectiontoFully-
test
Practical Chosen Ciphertext Secure Encryption from Fac
conchita-marotz
Efcient and Secure Source Authentication for Multicast Adrian Perrig y Ran Canetti Dawn
faustina-dinatale
and Client Data Encryption
ellena-manuel
The Order of Encryption and Authen tication for Protecting Comm unications Or Ho Secure
debby-jeon
Deniable Functional Encryption
min-jolicoeur
NIST Special Publication B Recommendation for Block Cipher Modes of Operation The CMAC
tawny-fly
Securing Frame Communication in Browsers
briana-ranney
Composability and On-Line Deniability of Authentication
stefany-barnette
Motivation4!Prone to lifting !User authentication
kittie-lecroy
Phishing Prevention with Hybrid Authentication/Authorization
kittie-lecroy
Database of Cross-Contaminated or Misidentified Cell Lines
calandra-battersby
Product Serialisation to Authentication and Patient Safetye Pharmaceu
lindy-dunigan
Shibboleth
cheryl-pisano
(IJCSIS) International Journal of Computer Science and InfoVol. 5, No.
calandra-battersby
Figure 1 GPRS Architecture and Interfaces The HLR is a database that c
alexa-scheidler
A Decade of Secure, Hosted
debby-jeon
12
13
14
15
16
17
18
19
20
21
22