File:C14h-u2f-how-security-keys-work.pdf

From NoName e.V.
Revision as of 21:18, 30 October 2014 by SECuRE (talk | contribs) (Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

C14h-u2f-how-security-keys-work.pdf(file size: 2.22 MB, MIME type: application/pdf)

Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current21:18, 30 October 2014 (2.22 MB)SECuRE (talk | contribs)Folien der chaotischen Viertelstunde „U2F (universal 2nd factor) - how security keys work“

There are no pages that use this file.