E-Authentication

Results: 422



#Item
301Authentication / Notary / Packaging / Computer security / Biometrics / Access token / Two-factor authentication / Identity assurance / Security / Identity management / Access control

Challenge & Response within E-Authentication Framework NIST Symposium February 9, [removed]February 10, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
302Access control / Electronic authentication / Authentication / Password / One-time password / Two-factor authentication / Security token / Security / Identity management / Computer security

NIST E-Authentication Guidance: Can we add KBA? NIST KBA Symposium Feb. 9, 2004 Bill Burr [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
303Computer security / Access control / E-Authentication / Federated identity / Public administration / Authentication / Identity assurance / Electronic authentication / Certificate policy / Identity management / Security / Technology

The President’s E-Government Initiative E-Authentication Guidance NIST KBA Symposium February 9, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
304Electronic commerce / Knowledge-based authentication / Social Security / Social Security Administration / Social Security number / Authentication / Computer security / Electronic business / Computer network security / Security / Taxation in the United States

e-Authentication A Social Security Perspective

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
305National security / Identity management / FIPS 201 / Standards / Crime prevention / Credential / E-Authentication / Access control / Logical access control / Security / Computer security / Public safety

Memorandum for Chief Information Officers

Add to Reading List

Source URL: georgewbush-whitehouse.archives.gov

Language: English - Date: 2008-05-27 17:43:08
306Out of wallet / Authentication / Credit bureau / Identity score / Technology / Economics / Knowledge-based authentication / Credit / Security / ACT

PEC Solutions, Inc Leadership in e-Government Solutions KBA —Responsible Use and Scoring February 10, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
307One-time password / Data security / Two-factor authentication / Authentication / Information security / Transaction authentication number / SMS / Password / Security / Technology / Computer security

567-1001_LogoUeberarbeitung_toh_final_t_ecke_e_Schließen

Add to Reading List

Source URL: www.cartes.com

Language: English
308Identity / Federated identity / Public administration / Federated identity management / Digital identity / E-Authentication / Information security / Authentication / Security Assertion Markup Language / Identity management / Security / Computer security

State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013

Add to Reading List

Source URL: cio.ca.gov

Language: English - Date: 2014-05-09 16:26:27
309FIPS 201 / Standards / Identity document / E-Authentication / Smart card / Authentication / Public key infrastructure / I-9 / Cryptography / Security / Federated identity

Personal Identity Verification Interoperability for Non-Federal Issuers

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2010-08-02 14:43:36
310United States Department of Homeland Security / Radio-frequency identification / Biometric passport / Biometrics / Data security / Visa Waiver Program / Russian passport / US-VISIT / Machine-readable passport / Security / National security / Passports

Privacy Impact Assessment US-VISIT Authentication of e-Passports

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2006-09-19 16:59:57
UPDATE