E-Authentication

Results: 422



#Item
1

® SE CURE YOUR HE A LT HC A R E DATA WITH BIOMETR IC AUTHENTICATION You become the password.

Add to Reading List

Source URL: iwsinc.com

Language: English - Date: 2016-08-23 13:23:16
    2

    ® I M AGEWA RE ’S MOBILE BIOME T RIC USER AUTHENTICATION SOFTWAR E AS A SERV I C E You become the password.

    Add to Reading List

    Source URL: goverifyid.com

    Language: English - Date: 2016-06-29 11:23:00
      3

      CLAVISTER Multi Factor Authentication F E AT U R E S ƒƒ strong

      Add to Reading List

      Source URL: www.hermitage.be

      Language: English - Date: 2017-11-09 05:58:22
        4

        I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

        Add to Reading List

        Source URL: www.iwsinc.com

        Language: English - Date: 2017-10-18 21:20:11
          5

          Study Report on Biometrics in E-Authentication

          Add to Reading List

          Source URL: www.biosig-id.com

          Language: English - Date: 2016-01-21 00:15:16
            6

            PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

            Add to Reading List

            Source URL: mjwilber.org

            - Date: 2015-09-25 13:01:34
              7

              Two Factor Authentication- VPN Signing into Any Connect VPN using Two-Factor Once you enroll in two factor authentication (twofactor.fiu.edu/enroll), whenever you access the AnyConnect VPN client it will prompt you to e

              Add to Reading List

              Source URL: twofactor.fiu.edu

              - Date: 2017-01-24 14:17:16
                8

                www.t hales-esecurity.com ENSURE END USER IDENTITY VIA AUTHENTICATION AND eSIGNATURE INTEGRATED SERVICES Two factor authentication and e-signature across entire application ecosystem

                Add to Reading List

                Source URL: go.thalesesecurity.com

                  9

                  Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication Matthias Wachs, Quirin Scheitle, Georg Carle Chair of Network Architectures and Services Technical University of Munich (TUM) E

                  Add to Reading List

                  Source URL: tma.ifip.org

                  - Date: 2017-06-17 09:11:30
                    10

                    CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition Ethan M. Rudd and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd,tboult}@

                    Add to Reading List

                    Source URL: www.cv-foundation.org

                    - Date: 2016-05-30 11:04:05
                      UPDATE