Works matching DE "AUTHENTICATION (Law)"


Results: 561
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18

    CHAP and rewrite components.

    Published in:
    Acta Informatica, 2011, v. 48, n. 5/6, p. 317, doi. 10.1007/s00236-011-0141-z
    By:
    • Vágvölgyi, Sándor
    Publication type:
    Article
    19
    20
    21

    Online fingerprint verification.

    Published in:
    Journal of Medical Engineering & Technology, 2007, v. 31, n. 1, p. 36, doi. 10.1080/03091900500324194
    By:
    • Upendra, K.;
    • Singh, S.;
    • Kumar, V.;
    • Verma, H. K.
    Publication type:
    Article
    22
    23
    24
    25
    26

    Editorial.

    Published in:
    2011
    By:
    • Palmer-Brown, D.
    Publication type:
    Editorial
    27
    28
    29
    30
    31
    32
    33

    Insecurity.

    Published in:
    ComputerWorld Hong Kong, 2008, v. 25, n. 8, p. 4
    By:
    • Hammond, Stefan
    Publication type:
    Article
    34

    Harden your weak points.

    Published in:
    ComputerWorld Hong Kong, 2008, v. 25, n. 4, p. 14
    By:
    • Hammond, Stefan
    Publication type:
    Article
    35
    36

    The RFID Revolution.

    Published in:
    Marketing Health Services, 2004, v. 24, n. 3, p. 43
    By:
    • Fanberg, Hank
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    50