E-Authentication

Results: 422



#Item
311Government Paperwork Elimination Act / Public administration / Electronic signature / Open government / Electronic Signatures in Global and National Commerce Act / Digital signature / Records management / E-Government / Authentication / Cryptography / Law / Notary

Department of Commerce $ National Oceanic & Atmospheric Administration $ National Marine Fisheries Service

Add to Reading List

Source URL: www.nmfs.noaa.gov

Language: English - Date: 2014-04-11 17:52:19
312Federated identity / Domain name system / Radio-frequency identification / Verisign / IBM Tivoli Access Manager / Two-factor authentication / Authentication / Single sign-on / Identity management / Security / Cryptography / Computer security

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:51
313Internet protocols / Block cipher modes of operation / Botnet / Malware / RC4 / Transmission Control Protocol / Internet security / Password authentication protocol / Transport Layer Security / Cryptography / Computing / Computer network security

P ROV E X: Detecting Botnets with Encrypted Command and Control Channels Christian Rossow †‡? and Christian J. Dietrich †¶ †University of Applied Sciences Gelsenkirchen, Institute for Internet Security, Germany

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2013-04-16 08:32:23
314Computer security / Login / Transaction authentication number / Password policy / SAP Logon Ticket / Access control / Security / Password

USER RESPONSIBILITY STATEMENT LOGON ID AND PASSWORD: The Treasury User Provisioning System will e-mail the individual logon ID and mail the temporary password. The password, which is under your sole control, provides pr

Add to Reading List

Source URL: www.doi.gov

Language: English - Date: 2012-10-03 09:19:29
315Login / Authentication / Spamming / Security / Cryptography / Password

In order for us to create your subscription, please complete the details requested below and e-mail them back to us. Please be sure to include IP ranges if you want your subscription account to be IP authenticated. E

Add to Reading List

Source URL: epic.org.nz

Language: English - Date: 2014-02-27 18:38:59
316Computer security / Two-factor authentication / Login / Password / Credential / Federated identity / Security / Access control / Identity management

REGISTERING A CREDENTIAL To meet federal data security standards, NMLS requires any Federal Registry user who has access to more than one individual’s personally identifying information (i.e., information that is not

Add to Reading List

Source URL: fedregistry.nationwidelicensingsystem.org

Language: English - Date: 2014-01-03 12:50:49
317Transaction authentication number / Transactional account / Business / Investment / Electronic commerce / Mobile payments / Embedded systems / Payment systems / Banking / Finance

Microsoft Word[removed]E-File Request[removed]docx

Add to Reading List

Source URL: flhsmv.gov

Language: English - Date: 2014-06-24 09:53:10
318Technology / Law / General Services Administration / E-Authentication / Federated identity / Office of Management and Budget / Paperwork Reduction Act / Clinger–Cohen Act / Federal enterprise architecture / United States Office of Management and Budget / Public administration / Government

FY 2003 Report to Congress on Implementation of The E-Government Act

Add to Reading List

Source URL: m.whitehouse.gov

Language: English - Date: 2014-09-12 08:15:55
319Computer network security / Data security / Information Risk Management / National Institute of Standards and Technology / Standards for Security Categorization of Federal Information and Information Systems / Security controls / Authentication / Security token / Threat / Security / Computer security / Cyberwarfare

U.S. Department of Energy Office of the Energy Efficiency and Renewable Energy (EERE) [Insert System Name] E-authentication Risk Assessment

Add to Reading List

Source URL: webgovernanceteam.wikispaces.com

Language: English - Date: 2012-09-20 16:08:12
320Chromatography / Mass spectrometry / Separation processes / Chemical pathology / Laboratory techniques / Gas chromatography–mass spectrometry / Nuclear magnetic resonance / Gas chromatography / Drug Enforcement Administration / Chemistry / Scientific method / Science

Authentication of Reference Materials Roxanne E. Franckowski Senior Forensic Chemist Special Testing and Research Laboratory Drug Enforcement Administration

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-04-30 10:56:23
UPDATE