Skip to main content
Search results
https://www.mynavyhr.navy.mil/Career-Management/Reserve-Personnel-Mgmt/IRR/IRR-FAQ/
...incurred via contract. The IRR is composed of the Active Status Pool (ASP) and...Military ID Card and DD Form 1853, Authentication of Reserve Status ...
https://apps.dtic.mil/docs/citations/AD1046601
...systems. Without a strong method of authentication to access these systems, threats...successful. A recent method of authentication forthe Windows 8 ...
https://apps.dtic.mil/docs/citations/AD1055468
The VACF is composed of five VICTORY component types Authentication, Attribute...Engineering Center TARDEC, can enable authentication and ...
https://static.e-publishing.af.mil/production/1/saf_fm/publication/afi65-103/afi65-103.pdf
...preparation, issue, numbering, funding, authentication, distribution and maintenance of...and civilian personnel. 3.1.2. Authentication. The process ...
https://apps.dtic.mil/sti/citations/tr/AD1046601
...systems. Without a strong method of authentication to access these systems, threats...successful. A recent method of authentication forthe Windows 8 ...
https://apps.dtic.mil/docs/citations/ADA226597
...password. Passwords are normally composed of a meaningful detail, such as a...Exploration into other methods of user authentication and access control ...
https://apps.dtic.mil/sti/citations/tr/AD1055468
The VACF is composed of five VICTORY component types Authentication, Attribute...Engineering Center TARDEC, can enable authentication and ...
https://nij.ojp.gov/library/publications/linguistic-authentication-and-reliability
...discusses language-based techniques to authenticate documents involved in legal proceedings...Linguistic Authentication and Reliability NCJ Number ...
https://apps.dtic.mil/docs/citations/ADA478636
...largely been based on encryption and authentication schemes. WSN Authorization Specification...language that can specify arbitrary, composable ...
https://apps.dtic.mil/docs/citations/ADA440577
...technologies exist for trust management, authentication, secure communication channels...channels, and service discovery, but composing all of these ...
https://apps.dtic.mil/docs/citations/ADA422110
...is based on a distributed system composed of many routers grouped into management...scalable means of verifying the authenticity and authorization of ...
https://static.e-publishing.af.mil/production/1/saf_cn/publication/afi33-322/afi33-322.pdf
.... 62 Chapter 8—AUTHENTICATING RECORDS 63 8.1. Authentication Methods for Air........................ 63 8.2. Authentication Authority ...
https://apps.dtic.mil/docs/citations/ADA462541
...security properties of a protocol by composing the guarantees offered by embedded...the essence of key distribution, authentication time stamps and ...
https://apps.dtic.mil/sti/citations/tr/ADA478636
...largely been based on encryption and authentication schemes. WSN Authorization Specification...language that can specify arbitrary, composable ...
https://www.state.gov/reports/2023-trafficking-in-persons-report/somalia
...and armed conflict working group composed of representatives from the FGS, FMS...remains challenging to obtain or authenticate. Anecdotal evidence ...
https://apps.dtic.mil/sti/citations/tr/ADA440577
...technologies exist for trust management, authentication, secure communication channels...channels, and service discovery, but composing all of these ...
https://apps.dtic.mil/sti/citations/tr/ADA422110
...is based on a distributed system composed of many routers grouped into management...scalable means of verifying the authenticity and authorization of ...
https://apps.dtic.mil/sti/citations/tr/ADA462541
...security properties of a protocol by composing the guarantees offered by embedded...the essence of key distribution, authentication time stamps and ...
https://apps.dtic.mil/docs/citations/ADA126003
...network of personal computers may be composed of nodes that are completely controlled...its local machine. This includes authenticating sharers ...
https://apps.dtic.mil/sti/citations/tr/AD0846141
...been analyzed and identified to be composed primarily of azelaic acid dihydrazide...by an independent synthesis of an authentic sample....been ...