Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2
Pages
|
Viewing 1-10 of 18 total results
Journal of Mobile, Embedded and Distributed Systems ...
COVID-19 Resources. Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel).Numerous and frequently-updated resource results are available from this WorldCat.org search.OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus ...
(PDF) Project Management with IT Security Focus
Project Management with IT Security Focus. Article (PDF Available) · December 2011 ... Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 4, 2011. ISSN 2067 ...
 Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
An Approach to Mobile Multimedia Digital Rights Management ...
Toma, C., Boja, C.: Survey of Mobile Digital Rights Management Platforms. Journal of Mobile, Embedded and Distributed Systems 1(1), 32–42 (2009) Google Scholar
About the Conference | The 19th International Conference ...
The International Conference on INFORMATICS in ECONOMY (IE), Education, Research & Business Technologies, is held every year since 1993 in Bucharest, Romania.The Conference promotes research results in Business Informatics and related Computer Science topics: Cloud, Distributed and Parallel Computing, Mobile-Embedded and Multimedia Solutions, E-Society, Enterprise and Business Solutions ...
[PDF] Internet Banking Two-Factor Authentication using ...
Journal of Mobile, Embedded and Distributed Systems This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application.
ACS Team - www.acs.ase.ro @ Department of Economic ...
ACS Team. Tags: ACS Team ACS - Applied Computer Science And Cyber Security Team - (ACS + ACS = 2 * ACS = acs.ase.ro) is formed by some members of the "IT & Computer Science" groups from the Department of Economic Informatics and Cybernetics (dice.ase.ro), of the Faculty of Cybernetics, Statistics and Economic Informatics (csie.ase.ro) from Bucharest University of Economic Studies ().
www.acs.ase.ro/acs-team
Average Rating (0 votes)
CheckPDF: Check What is Inside Before Signing a PDF Document
A. Alsaid and C. J. Mitchell. Dynamic Content Attacks on Digital Signatures. In: Information Management and Computer Security, 13(4):328–336, 2005.
Assessment of Secure OpenID-Based DAAA Protocol for ...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session ...
 Conference Program
7 Conference Presentations Program Cloud and Distributed/Parallel Computing SECTION 1 Thursday, 17 May, 13:30 - 15:15– Room R 411 Chairmen: Alin ZAMFIROIU, Alexandru TUGUI Secretary: Ana-Maria GHEORGHE 1. CHARACTERISTICS OF OPEN GRID SERVICES ARCHITECTURE -
1 2
Pages
|