Suggested Topics within your search.
Showing 81 - 100 results of 106 for search '"security certificate"', query time: 2.12s Refine Results
  1. 81
    by Lee Chung Chieh, 李仲捷
    Published 2013
    ... not implement security certificates due to considerations of budget or economic effects. Facing the demand...
    Get full text
    Others
  2. 82
    ..., the VoIP quality examination technology, the information security certification, and the experiences...
    Get full text
    Others
  3. 83
    by LIN,KUN-HSIANG, 林琨翔
    Published 2019
    ... app store fees, security certification, and cross-platform testing and so on. Fortunately, due...
    Get full text
    Others
  4. 84
    by Chen-hung chang, 陳泓璋
    Published 2011
    ... complexity. Securities certificate institution having long been customary in securities industry is further...
    Get full text
    Others
  5. 85
    by Wun-Ting Lin, 林文廷
    Published 2009
    ... and relatives only. In addition, security certification and price were the most important factors for low...
    Get full text
    Others
  6. 86
    by You-jhin Jian, 簡有志
    Published 2006
    ... domestic mortgage-backed securities certificate mainly. As real example analysis with the materials...
    Get full text
    Others
  7. 87
    by Xiao-Ling Lin, 林曉鈴
    Published 2013
    ... classified in the Cyber Security Certification Examination; (3) develop mechanisms for promoting training...
    Get full text
    Others
  8. 88
    by Ali, Muneeb
    Published 2017
    ... Authorities (CAs) that publish security certificates. Further, the success of cloud hosted services...
    Get full text
  9. 89
    by CAI,SHU-PING, 蔡淑萍
    Published 2015
    ... security certification topic is determined by their needs selected case kindergarten from the safety...
    Get full text
    Others
  10. 90
    by Chia-Chin Hsiao, 蕭家錦
    Published 2016
    ...-device usability, easy to identify tourism information security certification mark, Consumer education...
    Get full text
    Others
  11. 91
  12. 92
    by Maitreyi Ponguwala, DR.Sreenivasa Rao
    Published 2019-10-01
    ... of recommendation filtering in the network. Initially the entire network is grouped by Secure Certificate based...
    Get full text
    Article
  13. 93
    by Hui-Hsiung Chen, 陳輝雄
    Published 2010
    ... etc. all need to comply with the related laws and regulations to secure certifications before...
    Get full text
    Others
  14. 94
    by Gerson de Souza Faria
    Published 2016
    .... The results of the low-cost attacks here developed expose serious shortcomings in the process of security...
    Get full text
  15. 95
    by Faria, Gerson de Souza
    Published 2016
    ... developed expose serious shortcomings in the process of security certification of such equipment....
    Get full text
    Others
  16. 96
    ... in February 2018). Delays in institutional approval were largely due to unharmonised data security...
    Get full text
    Article
  17. 97
    by Po-Jen Chang, 張博仁
    Published 2002
    ... into small values in the form of securities certificates or beneficiary certificates for sales to investors...
    Get full text
    Others
  18. 98
    by Obioha, Chinonye Leuna
    Published 2017
    ...’ perspective using user-centred design. E-commerce websites are known to have features such as security...
    Get full text
  19. 99
    by Straub, Tobias
    Published 2006
    ... trustcenter by a service provider. In this setting, a secure certificate enrolment process is of particular...
    Get full text
    Get full text
    Others
  20. 100
    ... and secured certificates. Inaccessibility of the registrar offices, lack of relevant manpower and political...
    Get full text
    Article