Authentication

Results: 7063



#Item
461Computer access control / E-commerce / Certificate authorities / Public-key cryptography / Federated identity / Authentication / Digital identity / Entrust / Public key certificate / IdenTrust / Peer-to-peer / Identity management

Identity Authentication: Increasing Confidence in Peer-to-Peer Networks IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
462Payment systems / Credit cards / Computer access control / E-commerce / 3-D Secure / One-time password / Debit card / Visa Inc. / MasterCard / Password / Transaction authentication number / Rede S.A.

BNU MasterCard Debit Card One-Time Password for Your Secure Online Purchases

Add to Reading List

Source URL: www.bnu.com.mo

Language: English - Date: 2015-01-29 21:30:42
463Key management / Public-key cryptography / Computer access control / Public key infrastructure / Certificate authorities / Authentication / Public key certificate / IdenTrust

IdenTrustâ„¢ Trust Counsel Smarter and Faster Trust Deployment The IdenTrustâ„¢ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
464Computer access control / Automatic identification and data capture / User interface techniques / Markup languages / Speech synthesis / VoiceXML / Speaker recognition / Interactive voice response / Call Control eXtensible Markup Language / Authentication / Multi-factor authentication / Biometrics

DRAFT February, 2006 Speaker Identification and Verification Applications

Add to Reading List

Source URL: www.voicexml.org

Language: English - Date: 2015-06-05 20:40:12
465Computer access control / Hypertext Transfer Protocol / Access control / Identity management / Security / HTTP cookie / Authentication / Password / Login / Session

A Detailed Description of the PAPI Protocol The PAPI Development Team <> Contents 1 An overview of PAPI 1.1

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2008-09-21 16:36:09
466Standards organizations / WLAN Authentication and Privacy Infrastructure / IEEE 802.11 / IEEE Standards Association / Wireless security / ISO/IEC JTC 1 / International Organization for Standardization / IEEE 802 / Wi-Fi / ISO/IEC JTC 1/SC 37

January 2006 doc.: IEEE0154r1 IEEE P802.11 Wireless LANs Fast Track Executive Summary Letter Date:

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2006-03-21 21:41:34
467Internet in India / Ministry of Communications and Information Technology / Computer access control / DigiLocker / Documents / Aadhaar / Digital India / Digital locker / Password / Biometrics / Authentication / Form

User Manual: DigiLocker DigiLocker User Manual (https://digitallocker.gov.in) Department of Electronics and

Add to Reading List

Source URL: digilocker.gov.in

Language: English - Date: 2016-08-20 08:44:22
468Public-key cryptography / Identity management / Public key infrastructure / Key management / Cryptography / Privacy-enhancing technologies / Pseudonymity / Authentication / Blacklist / User / Internet privacy / Anonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: homes.soic.indiana.edu

Language: English - Date: 2016-05-12 20:00:31
469Password / Security / Biometrics / Operating system / Authentication / Features new to Windows 7

Biometric Attendance System: Windows Client Application Installation Guide BAS Application Download: 1. Go to your organization domain like- attendance.gov.in 2. Now login in your organization portal with the username

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2016-04-29 06:24:16
470Fujian

Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach Xu Yang1, Wei Wu1, Joseph K. Liu2, and Xiaofeng Chen3 1Fujian

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
    UPDATE