E-Authentication

Results: 422



#Item
291Security / Online Computer Library Center / Proxy server / Password / Single sign-on / EZproxy / Authentication / Shibboleth / Federated identity / Computing / Library science

EZproxy connects library users to e-content with a single sign-on. OCLC® EZproxy® access and authentication software allows your library to deliver secure Web access to e-content simply and effectively. EZproxy facilit

Add to Reading List

Source URL: oclc.org

Language: English - Date: 2014-10-06 04:36:31
292Multi-factor authentication / Two-factor authentication / Security token / Authentication / Password / One-time password / Mutual authentication / Online banking / Information security / Security / Access control / Computer security

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room 3086 • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Authentication in an Internet Banking E

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-06 11:47:52
293Email / Authentication / Identity document / Password / Electronic signature / Security / Cryptography / Civil law

Welcome to the ODE Secure Web Portal User Guide If you followed the directions below and cannot complete the sign-up process for some reason, please contact the Security Administrator by clicking this link - Safe.Admin@e

Add to Reading List

Source URL: education.ohio.gov

Language: English - Date: 2014-07-18 11:25:43
294

Fraud Symposium • State of Security in the Payment Industry • Encryption and Dynamic Authentication • Consumer Authentication Value (CAV) • Why CAV can help secure e-commerce

Add to Reading List

Source URL: chicagofed.org

- Date: 2011-10-03 15:05:59
    295Notary / Electronic documents / Digital photography / Digital watermarking / Digital signature / Authentication / Watermark / Audio watermark detection / Digital Signature and Electronic Authentication Law / Cryptography / Security / Watermarking

    Digital Data Transmission – Security & Safeguards by Knud E. Hermansen† & Carlton Brown†† There are few surveying and engineering firms that have not had to transmit or been asked to transfer surveying and engine

    Add to Reading List

    Source URL: www.umaine.edu

    Language: English - Date: 2009-01-17 07:54:35
    296Government / National Institute of Standards and Technology / United States government secrecy / Data security / FIPS 201 / E-Authentication / Personally identifiable information / OMB Circular A-130 / Federal Information Security Management Act / Security / Computer security / National security

    MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

    Add to Reading List

    Source URL: georgewbush-whitehouse.archives.gov

    Language: English - Date: 2005-08-10 14:08:08
    297Transaction authentication number / Security / Access control / Computer crimes / Password manager / Password / Education / E-learning

    TO: RE: All GCC Students LOGIN Procedures for MyGCC and GCC Online Learning

    Add to Reading List

    Source URL: gogebic.edu

    Language: English - Date: 2014-06-02 14:50:53
    298Health Insurance Portability and Accountability Act / Internet privacy / Law / Technology / Government / E-Government / Open government / Public administration

    SPH Systems International Knowledge Based Authentication and Privacy Can Standards Help?

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-25 01:00:00
    299Business / 3-D Secure / EMV / Chip and PIN / Card security code / MasterCard / Chip Authentication Program / Bank card number / Authentication / Payment systems / Electronic commerce / Merchant services

    E-commerce Security ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose

    Add to Reading List

    Source URL: www.mastercard.com

    Language: English - Date: 2011-06-24 06:09:19
    300Authentication / Notary / Packaging / Electronic authentication / Security / Access control / Identity management

    KBA Applicability to e-Government Mindy Rudell Dick Stewart Robin Medlock Angel Rivera February 10, 2004

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-25 01:00:00
    UPDATE