Authentication

Results: 7063



#Item
351Cryptography / Signature / Public-key cryptography / Key management / E-commerce / Notary / Digital signature / Public key certificate / Document / Authentication / Email / Notice of electronic filing

Translated by Donna L. Hicks de Pérez-Mera Santo Domingo Speakers Bureau, S.A. Tel.: (; Fax.: (; E-mail: Law Noconcerning Electronic Commerce, Documents,

Add to Reading List

Source URL: indotel.gob.do

Language: English - Date: 2016-01-12 17:31:00
352Yes / Performing arts / Music / Entertainment

STORK Secure Identity Across Borders Linked Digital Agenda: eID authentication and signatures in the European digital single market

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2012-04-03 05:02:00
353Economy / Payment systems / Computer access control / Money / E-commerce / Finance / EMV / One-time password / 3-D Secure / Authentication / Multi-factor authentication / Mobile payment

AN EMV MIGRATION FORUM WHITE PAPER Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

Add to Reading List

Source URL: www.emv-connection.com

Language: English - Date: 2016-08-02 12:07:00
354Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
355Computer access control / Pharmaceutical industry / Validity / Authentication / Notary / Packaging / Validation / Business / Computer security / Security

UCD Activities and Progress 2014–11–18 Mark Rose and Rich Keller PDS User Centered Design

Add to Reading List

Source URL: mgmt.pds.nasa.gov

Language: English - Date: 2014-11-18 09:37:20
356Computer security / Security / Prevention / Computer access control / Pre-boot authentication / USB flash drive / Authentication / Trusted Platform Module / Password / Acer N50 / Disk encryption

Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

Add to Reading List

Source URL: static.acer.com

Language: English - Date: 2013-10-24 05:13:45
357Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
358Economy / Money / Business / Banking / Cheque / Numismatics / .hk / HK

International Conference on DNA technology for authentication, quality control and conservation of herbal materialDecat CUHK Reply Slip (paid by cheque) Please perform registration at “ http://www.bch.cuh

Add to Reading List

Source URL: www.bch.cuhk.edu.hk

Language: English - Date: 2016-03-15 04:34:56
359Intellectual property law / Human behavior / Behavior / Misconduct / Scientific misconduct / Applied ethics / Deception / Plagiarism / Theft / Authentication / Cheating in chess / Copyright

This notice has been produced on behalf of: AQA, CCEA, OCR, Pearson and WJEC Information for candidates - controlled assessments This document tells you about some things that you must and must not do when you are comple

Add to Reading List

Source URL: www.emmanuel.nottingham.sch.uk

Language: English - Date: 2015-09-14 05:30:00
360Cryptography / IOS jailbreaking / SHSH blob / Commitment scheme / IP / Interactive proof system / Boolean algebra / Challengeresponse authentication

JOURNAL OF COMPUTER AND SYSTEM SCIENCES

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
UPDATE