E-Authentication

Results: 422



#Item
121Software licenses / Legal documents / Cryptography / Electronic signature / Contract / Browse wrap / Clickwrap / Unconscionability / English contract law / Law / Contract law / Computer law

Doing business in Canada E-commerce Since Canada’s electronic commerce strategy was first announced in September 1998, the federal government has released policies on cryptography and authentication, enacted personal i

Add to Reading List

Source URL: www.nortonrosefulbright.com

Language: English - Date: 2015-04-18 21:21:33
122Data modeling / Database normalization / Relational algebra / Jet / Unit vector / Cosine similarity / Distance / Mathematics / Algebra / Elementary mathematics

Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz´alez-Jim´enez1, Manuele Bicego2, J.W.H. Tangelder3 , B.A.M Schouten3 , Onkar Ambekar3 , Jos´e Luis Alba-Castro1 , Enrico

Add to Reading List

Source URL: profs.sci.univr.it

Language: English - Date: 2011-10-29 17:56:17
123Access control / Identity management / Security token / E-Authentication / Single sign-on / Authentication / Security Assertion Markup Language / Email / Security / Computer security / Federated identity

Services Catalogue Department of Industry and Science Contents 1 Introduction

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:37:12
124Java Authentication and Authorization Service / Java platform / Computer network security / Java Agent Development Framework / Kerberos / Access control / Privilege / Computing / Security / Computer security

J ADE S ecurit y Add -On GUID E JADE SECURITY GUIDE USAGE RESTRICTED ACCORDING TO LICENSE AGREEMENT. last update: 28-February[removed]JADE 3.3 Authors: JADE Board

Add to Reading List

Source URL: jade.tilab.com

Language: English - Date: 2014-07-11 08:15:22
125World Wide Web / OAuth / Twitter / Technology / Social login / Computing / Cloud standards / Internet protocols

POINTROLL Twitter has implemented a new authentication process leveraging OAuth. When the creative needs to "push" to Twitter (i.e. tweeting or following from the ad), OAuth must be used. Using OAuth means that authenti

Add to Reading List

Source URL: www.pointroll.com

Language: English - Date: 2015-03-16 15:26:51
126Notary / Electronic commerce / Digital signature / Electronic signature / Non-repudiation / Public key certificate / Certificate authority / Authentication / Electronic business / Cryptography / Public-key cryptography / Key management

Business Issues in the implementation of Digital signatures E-Lock

Add to Reading List

Source URL: www.elock.com

Language: English
127FeliCa / Ubiquitous computing / Near field communication / Bit rate / Smart card / ISO standards / Technology / Telecommunications engineering

Contactless IC Token The RC-S892 and RC-S893 products are suitable for applications that demand robust security. For example, e-money payment and ID authentication. These products can be set up easily in a wide range

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-10-09 02:37:31
128Technology / Data / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Authenticator / Supplicant / Wired Equivalent Privacy / Wireless access point / Computer network security / Computing / Wireless networking

I N D U S T R Y T R E N D S Will IEEE 802.1X Finally Take Off in 2008? Neal Leavitt

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:45:56
129Time / Civil law / Notary / Electronic documents / Aesthetics / Trusted timestamping / Tamper-evident / Timestamp / Authentication / Cryptography / Security / Packaging

for C O U N S E L Safeguard the integrity of legal records and prove the authenticity of evidence to clients, auditors, and courts. Can you reliably prevail

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:41
130Authentication / Packaging / Security / Ü

On DEMAND Cryptographically timestamp and tamper-seal virtually any document, file or e-mail over the Web, even while you’re away from your primary computer.

Add to Reading List

Source URL: www.proofspace.com

Language: English - Date: 2013-06-11 17:07:48
UPDATE