Authentication

Results: 7063



#Item
191

BMC Footprints Authentication Guide

Add to Reading List

Source URL: supportcenter.ct.edu

- Date: 2014-10-17 16:16:32
    192

    Title: 3D/Multispectral Biometrics  Abstract: Automatic personal authentication using biometric information is becoming more essential in applications of public security, access control, forensics, banking, etc. Many

    Add to Reading List

    Source URL: www.icscc.org

    - Date: 2016-06-12 05:12:23
      193System software / Software / Computing / Windows Registry / Control Panel / Software license / Dynamic-link library

      EmerAuth External Authentication DLL VersionEmerald Management Suite

      Add to Reading List

      Source URL: www.iea-software.com

      Language: English - Date: 2003-06-16 13:23:11
      194Computing / Data / Information technology / Computer access control / Data management / Access control / Records management / Metadata / Attribute / XACML / PERMIS / Authentication

      Draft NISTIR 8112, Attribute Metadata

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-08-01 15:13:29
      195Computing / Directory services / Computer access control / Software / Computer security / Internet Standards / Internet protocols / Access control / Lightweight Directory Access Protocol / Authentication / Security Support Provider Interface / Password

      PDF Document

      Add to Reading List

      Source URL: www.inforouter.com

      Language: English - Date: 2015-03-26 12:13:27
      196Databases / IDMS / Computer access control / Economy / Identity document / Financial technology / Credit card / Transaction authentication number / Money

      Microsoft Word - S_13029_FAUcard_Unterlage_Personalneueinstellung.docx

      Add to Reading List

      Source URL: www.zuv.fau.de

      Language: English - Date: 2015-08-04 03:58:15
      197Computing / Cyberspace / Spamming / Spam filtering / Microsoft / Cybercrime / Email authentication / Email / DMARC / Phishing / Computer security / Outlook.com

      CUSTOMER PROTECT – RESPOND Your brand at risk Today, within a couple of minutes anyone can send an email claiming to be you. These phishing emails can leverage the domains you own, such as your YourCompany.com, or they

      Add to Reading List

      Source URL: info.agari.com

      Language: English - Date: 2016-07-16 12:51:44
      198Economy / Payment systems / Money / Financial services / E-commerce / Merchant services / Cryptographic protocols / Embedded systems / 3-D Secure / Credit card / Card security code / Authentication

      Definition of Systempay Standard Web Services Version 2.6a Writing, Reviewing, Approval

      Add to Reading List

      Source URL: systempay.cyberpluspaiement.com

      Language: English - Date: 2012-10-17 09:29:30
      199Cryptography / Public key infrastructure / Cryptographic software / Email authentication / Key management / Email encryption / Public-key cryptography / S/MIME / Key / Encryption / Email / Pretty Good Privacy

      Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2006-06-02 21:42:44
      200Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

      Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

      Add to Reading List

      Source URL: ietf.org

      Language: English - Date: 2014-03-02 06:27:58
      UPDATE