Authentication

Results: 7063



#Item
551Computer access control / Web portal / Authentication / Password

    GOOD  USE  OF  ONLINE  DOCUMENTARY  RESOURCES     The   University   of   Strasbourg’s   Joint   Documentary   Service   (SCD)   acquires   a   wide   ra

Add to Reading List

Source URL: wo.u-strasbg.fr

Language: English - Date: 2016-06-30 08:55:49
552Computer access control / Access control / Directory services / Federated identity / Distributed Common Ground System / Equipment of the United States Air Force / DCGS-A / XACML / Single sign-on / DCGS / Authentication / Active Directory

Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Add to Reading List

Source URL: www.jerichosystems.com

Language: English - Date: 2016-02-10 13:54:31
553Identity management / Computer access control / Federated identity / Electronic identification / Identification / Digital identity / Authentication / Eid / National Strategy for Trusted Identities in Cyberspace / Interoperability / Mobile identity management

Microsoft Word - SSEDIC Memorandum.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:06
554Computer access control / ESET / Authentication / Multi-factor authentication

ESET Secure Authentication provides native support for a variety of Microsoft Web Applications Benefits of the SDK

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-04-15 07:11:25
555Cryptography / Key management / Wireless networking / Building automation / Home automation / Block cipher / Symmetric-key algorithm / Skipjack / Encryption / Blowfish / Message authentication code / Data Encryption Standard

On the Security of Intra-Car Wireless Sensor Networks

Add to Reading List

Source URL: www.csie.ntu.edu.tw

Language: English - Date: 2014-04-11 22:39:21
556Identity management / National Strategy for Trusted Identities in Cyberspace / Credential / Authentication / ID.me / Identity assurance

The  National  Strategy  for   Trusted  Identities  in   Cyberspace   Aaron  Segal    

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-11-02 14:39:00
557Distributed computing architecture / Process calculi / Inter-process communication / Ambient calculus / Ambient intelligence / Message passing / Actor model / Short Message Service / Distributed object / Multi-factor authentication

Ambient References: Addressing Objects in Mobile Networks Tom Van Cutsem ∗ Elisa Gonzalez Jessie Dedecker ∗ Stijn Mostinckx †

Add to Reading List

Source URL: soft.vub.ac.be

Language: English - Date: 2007-01-09 07:10:57
558Payment systems / Authentication / 3-D Secure / Credit card / EMV

Systempay - cartes de test

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2011-03-21 10:24:42
559Ajax / Software architecture / Computer access control / Application programming interface / Technical communication / JSON / Web API / Authentication / File Transfer Protocol

API Documentation Version: IDnow GmbH – www.idnow.de

Add to Reading List

Source URL: www.idnow.eu

Language: English - Date: 2016-04-07 09:53:48
UPDATE