Authentication

Results: 7063



#Item
511Directory services / Computer access control / Internet Standards / Java platform / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / OpenLDAP / PERMIS / Authentication / LDAP Data Interchange Format

Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization

Add to Reading List

Source URL: ics-web.sns.ornl.gov

Language: English - Date: 2011-08-17 15:52:16
512

Usable Security (Authentication) What is it about? Usability and security are essential requirements of eGovernment services and applications. Integration of cryptographic methods into eGovernment applications

Add to Reading List

Source URL: www.iaik.tugraz.at

- Date: 2015-12-01 04:00:02
    513Packaging / Computer access control / Cryptography / ISO standards / Ubiquitous computing / Smart card / Patent claim / Authentication / Public-key cryptography / Tamper resistance

    USOO5276736A United States Patent]

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:27
    514Identity management / Federated identity / Computer access control / Access control / Computer security / Identity theft / GlobalSign / Authentication / Identity provider / Internet privacy / Digital identity

    Trusted Identities Foundational to Cloud Services LILA KEE CHIEF

    Add to Reading List

    Source URL: res.cdn.sys-con.com

    Language: English - Date: 2016-06-30 11:05:14
    515Computer network security / ISO standards / Computer access control / Access control / Internet protocols / Common Criteria / Security Target / Authentication / Computer security / Key management / Password / Virtual private network

    collaborative Protection Profile for Network Devices

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    Language: English - Date: 2016-07-22 07:40:18
    516Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

    Keyhub_Product_Overview_28

    Add to Reading List

    Source URL: www.iquestgroup.com

    Language: English - Date: 2016-05-10 04:15:28
    517Open Geospatial Consortium / ISO/TC 211 / Geographic information systems / Bbox / Minimum bounding box / Layers / Web Map Service

    Detailed instructions for WMS The Valtus WMS service is based on thespecification. (http://portal.opengeospatial.org/files/?artifact_id=1081&version=1&format=pdf) Valtus has added support for user authentication s

    Add to Reading List

    Source URL: www.valtus.com

    Language: English - Date: 2014-12-12 13:10:48
    518Computer access control / Biometrics / Identification / Surveillance / Data security / Authentication / Strong authentication / Biometric Tokenization / Biometric passport

    Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult University of Colorado at Colorado Springs Colorado Springs, CO 80918

    Add to Reading List

    Source URL: vast.uccs.edu

    Language: English - Date: 2013-12-13 11:56:27
    519Identity management / User interface techniques / Credential / Knowledge / Password / Form / Outlook.com / Authentication

    SEED Registry – Help Menu Before You Begin Gather the following documents: • Official/Un-official transcripts that document all college coursework and degrees you have

    Add to Reading List

    Source URL: www.seedalaska.org

    Language: English - Date: 2012-10-03 14:00:59
    520I-9 / Immigration to the United States / Authentication

    Employment Eligibility Verification (Form I-9) Instructions for Employees Step 1: Login To complete Section One of Form I-9, please visit

    Add to Reading List

    Source URL: hr.nd.edu

    Language: English - Date: 2015-08-24 22:07:07
    UPDATE