Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 31-40 of 50 total results
Freelance translator for IT content, English to German ...
Freelance translator and localizer English to German for IT companies. I translate your web sites, content marketing, customer communications, etc. Computing graduate with an additional degree in English and 20 years of translation experience.
https://www.proz.com/translator/125774
Average Rating (0 votes)
[PDF] Internet Banking Two-Factor Authentication using ...
Journal of Mobile, Embedded and Distributed Systems This paper describes a method of implementing two-factor authentication using smart phones as software tokens. The proposed system will use the mobile phone as a software token and generate unique one time passwords (OTP) that will be used when authenticating to an Internet Banking application.
[PDF] Forecasting Exchange Rates with Mixed Models ...
Journal of Mobile, Embedded and Distributed Systems Gaining accuracy in exchange rate forecasting applications provides true benefits for financial activities. Supported today by the advancements in computing power, machine learning techniques provide good alternatives to traditional time series estimation methods.
Collective Signature Protocols for Signing Groups ...
Journal of Mobile, Embedded and Distributed Systems. IV (2012) 193–202. Google Scholar. 10. International Standard ISO/IEC 14888-3:2006(E). Information technology –Security techniques – Digital Signatures with appendix – Part 3: Discrete logarithm based mechanisms. Google Scholar. 11.
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.
IE 2015 – The 14th International Conference on Informatics ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) – www.jmeds.eu; International Journal of Economic Practices and Theories (IJEPT) – www.ijept.org; and will be indexed by major databases: ISI Thomson Reuters Services Directory of Open Access Journal Cabell’s Directories of Publishing Opportunities
Assessment of Secure OpenID-Based DAAA Protocol for ...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session ...
A new comprehensive solution to handle information ...
Journal of Mobile, Embedded and Distributed Systems, 3(3), pp. 128--135. Google Scholar; Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management. Journal of Information Security, 4(02), p.92. Google Scholar; Sheikhpour, Razieh, and Nasser Modiri. "An approach to map COBIT processes to ISO/IEC 27001 information ...
ISM – IT&C Security Master – Informatics Security Master ...
Journal of Mobile, Embedded and Distributed Systems. Scientific / Tech. Handbook. Information Security Handbook. Scientific. NEWS. Recent news entries about the master and Information Security. Events. Cyber Security Master – Opening meeting for the 1st year master students
ism.ase.ro/
Average Rating (0 votes)
IE-ASE 2014 : The 13th International Conference on ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) - www.jmeds.eu International Journal of Economic Practices and Theories (IJEPT) - www.ijept.org and will be indexed by major databases: ISI Thomson Reuters Services Directory of Open Access Journal Cabell’s Directories of Publishing Opportunities EBSCO (Business Source Complete) ICAAP
1 2 3 4 5
Pages
|