Works matching DE "LEGAL authentication software"
1
- Malaysian Journal of Computer Science, 2011, v. 24, n. 2, p. 111
- Hau, Y. W.;
- Khalil-Hani, Mohamed;
- Marsono, Muhammad N.
- Article
2
- Financial Executive, 2008, v. 24, n. 1, p. 60
- Article
4
- Journal of Cryptology, 2010, v. 23, n. 3, p. 402, doi. 10.1007/s00145-010-9061-2
- Katz, Jonathan;
- Ji Shin;
- Smith, Adam
- Article
5
- Computer Journal, 2007, v. 50, n. 6, p. 728, doi. 10.1093/comjnl/bxm023
- Imtiaz Ahmad;
- A. Shoba Das
- Article
6
- Intel Technology Journal, 2009, v. 13, n. 2, p. 148
- Meiyuan Zhao;
- Hong Li;
- Wouhaybi, Rita;
- Walker, Jesse;
- Lortz, Vic;
- Covington, Michael J.
- Article
7
- Intel Technology Journal, 2009, v. 13, n. 2, p. 130
- Chandrashekar, Jaideep;
- Orrin, Steve;
- Livadas, Carl;
- Schooler, Eve M.
- Article
8
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- Cornett, Linden;
- Grewal, Ken;
- Men Long;
- Millier, Marc;
- Williams, Steve
- Article
9
- Intel Technology Journal, 2009, v. 13, n. 2, p. 96
- Brickell, Ernie;
- Jiangtao Li
- Article
10
- Intel Technology Journal, 2009, v. 13, n. 2, p. 52
- Gueron, Shay;
- Kounavis, Michael E.
- Article
11
- IETE Technical Review, 2012, v. 29, n. 1, p. 80, doi. 10.4103/0256-4602.93141
- Moharrum, Mohammed A.;
- Al-Daraiseh, Ahmad A.
- Article
12
- Journal of the American Medical Informatics Association, 2008, v. 15, n. 3, p. 363, doi. 10.1197/jamia.M2662
- Langella, Stephen;
- Hastings, Shannon;
- Oster, Scott;
- Pan, Tony;
- Sharma, Ashish;
- Permar, Justin;
- Ervin, David;
- Cambazoglu, B. Barla;
- Kurc, Tahsin;
- Saltz, Joel
- Article
13
- Carpathian Journal of Electronic & Computer Engineering, 2010, v. 3, n. 1, p. 61
- Article
14
- Sensors (14248220), 2011, v. 11, n. 5, p. 5020, doi. 10.3390/s110505020
- Pardeep Kumar;
- Choudhury, Amlan Jyoti;
- Sain, Mangal;
- Sang-Gon Lee;
- Hoon-Jae Lee
- Article
15
- EURASIP Journal on Advances in Signal Processing, 2010, p. 1, doi. 10.1155/2010/345743
- Qinghan Xiao;
- Xue-Dong Yang
- Article
16
- EURASIP Journal on Advances in Signal Processing, 2009, p. 1, doi. 10.1155/2009/980159
- Barzegar, Nakissa;
- Moin, M. Shahram
- Article
17
- Perl Review, 2006, v. 2, n. 3, p. 24
- Article
19
- Multimedia Tools & Applications, 2018, v. 77, n. 6, p. 6713, doi. 10.1007/s11042-017-4595-z
- Article
20
- IT Professional, 2009, v. 11, n. 3, p. 60, doi. 10.1109/MITP.2009.60
- Miller, H. Gilbert;
- Murphy, Richard H.
- Article
21
- IT Professional, 2006, v. 8, n. 5, p. 31, doi. 10.1109/MITP.2006.123
- Barros, Alistair P.;
- Dumas, Marlon
- Article
22
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 91, doi. 10.1007/s11277-009-9788-y
- Jong Sik Moon;
- Jong Hyuk Park;
- Deok Gyu Lee;
- Im-Yeong Lee
- Article
23
- IEEE Internet Computing, 2009, v. 13, n. 3, p. 56, doi. 10.1109/MIC.2009.59
- Kuan-Ta Chen;
- Chun-Rong Huang;
- Chu-Song Chen;
- Jau-Yuan Chen
- Article
24
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 6, p. 14
- Article
25
- Computer Science & Telecommunications, 2010, v. 24, n. 1, p. 48
- Akinwale, A. T.;
- Ibharalu, F. T.
- Article
26
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 369
- YING-NONG CHEN;
- CHIN-CHUAN HAN;
- CHENG-TZU WANG;
- KUO-CHIN FAN
- Article
27
- Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 129
- Article
28
- Journal of Mathematical Cryptology, 2009, v. 3, n. 2, p. 133, doi. 10.1515/JMC.2009.006
- Article
29
- Python Papers, 2010, v. 5, n. 3, p. 1
- Article
30
- Peer-to-Peer Networking & Applications, 2013, v. 6, n. 1, p. 61, doi. 10.1007/s12083-012-0129-7
- Wu, Shuhua;
- Pu, Qiong;
- Kang, Fei
- Article