Listing 1 - 10 of 372 | << page >> |
Sort by
|
Choose an application
Discovery, authentication, and authorization protocols between hosts and storage devices over multiple transports are defined in this standard. It specifies a new Silo Type Identifier (STID) allocation process that uses the IEEE Registration Authority.
Authentication. --- Authentication --- History.
Choose an application
State-of-the-art authentication and authorization mechanisms for networks, especially for IoT and access devices, are integrated in this amendment. Specifications for how IEEE Std 802.1X may be utilized for authentication and authorization by IEEE 1901 networks are provided in this amendment.
Authentication. --- Authentication --- History.
Choose an application
This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.
Authentication. --- Food.
Choose an application
Choose an application
This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.
Authentication. --- Food.
Choose an application
This Special Issue of Foods comprises ten research and two review articles, highlighting the recent advances in food authentication and clearly demonstrating that no single method is suitable to cover all aspects of food authenticity.
Authentication. --- Food.
Choose an application
NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key Infrastructure (PKI)-based identity credentials that are issued for mobile devices by federal departments and agencies to individuals who possess and prove control over a valid Personal Identity Verification (PIV) Card. This document, SP 800-166, contains the requirements and test assertions for testing the Derived PIV Application and associated Derived PIV data objects implemented on removable hardware tokens and within mobile devices. The tests reflect the design goals of interoperability and interface functions.
Choose an application
Choose an application
Choose an application
Listing 1 - 10 of 372 | << page >> |
Sort by
|