File:C14h-u2f-how-security-keys-work.pdf: Difference between revisions
Jump to navigation
Jump to search
(Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“) |
(No difference)
|
Latest revision as of 21:18, 30 October 2014
Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Dimensions | User | Comment | |
---|---|---|---|---|
current | 21:18, 30 October 2014 | (2.22 MB) | SECuRE (talk | contribs) | Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“ |
You cannot overwrite this file.
File usage
There are no pages that use this file.