ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information technology. Security techniques. Biometric information protection
Mapping Intimacies
◽
10.3403/30136313u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Protection
◽
Information Technology Security
◽
Biometric Information
Download Full-text
Related Documents
Cited By
References
Information technology. Security techniques. Biometric information protection
10.3403/30136313
◽
2011
◽
Keyword(s):
Information Technology
◽
Information Protection
◽
Information Technology Security
◽
Biometric Information
Download Full-text
Information technology. Security techniques. Code of practice for personally identifiable information protection
10.3403/30286827u
◽
2017
◽
Keyword(s):
Information Technology
◽
Information Protection
◽
Code Of Practice
◽
Information Technology Security
◽
Personally Identifiable Information
Download Full-text
Information technology. Security techniques. Code of practice for personally identifiable information protection
10.3403/30286827
◽
2017
◽
Cited By ~ 1
Keyword(s):
Information Technology
◽
Information Protection
◽
Code Of Practice
◽
Information Technology Security
◽
Personally Identifiable Information
Download Full-text
Information technology. Security techniques. Digital signature scheme giving message recovery
10.3403/00327120
◽
1994
◽
Keyword(s):
Information Technology
◽
Digital Signature
◽
Signature Scheme
◽
Information Technology Security
◽
Message Recovery
◽
Digital Signature Scheme
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00327117
◽
1994
◽
Cited By ~ 2
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00553840u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00553840
◽
1995
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Key management
10.3403/01566482
◽
2000
◽
Keyword(s):
Information Technology
◽
Key Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Hash-functions
10.3403/01640663u
◽
2015
◽
Keyword(s):
Information Technology
◽
Hash Functions
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Digital signature schemes giving message recovery
10.3403/01569864
◽
1998
◽
Keyword(s):
Information Technology
◽
Digital Signature
◽
Signature Schemes
◽
Information Technology Security
◽
Message Recovery
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close