E-Authentication

Results: 422



#Item
341Carnegie Mellon University / Computer emergency response team / Spamming / Antivirus software / Email authentication / Whitelist / MAAWG / European Network and Information Security Agency / Request Tracker / Computer security / Computing / Software

E-CoAT European Cooperation of Abuse fighting Teams Remarks on E-CoAT TF-CSIRT/FIRST joint event

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-01-26 05:14:31
342Fingerprint recognition / Fingerprint / Iris recognition / Keystroke dynamics / Facial recognition system / Authentication / BioAPI / Biometric points / Biometrics / Security / Surveillance

C OIDEN L U MN T ITSEC Y STCIENCE ION T ITSL E

Add to Reading List

Source URL: lifesciences.ieee.org

Language: English - Date: 2014-05-06 09:18:34
343Identity management / Federated identity / Security Assertion Markup Language / Single sign-on / SAML 2.0 / Authentication / Identity provider / SAML 1.1 / Computer security / System software / Security

P R O D U C T DATA S H E E T PagerDuty Single Sign-on (SSO) and Directory Integration OneLogin Free Plan for PagerDuty

Add to Reading List

Source URL: www.onelogin.com

Language: English - Date: 2014-04-23 17:26:34
344

Fraud Symposium • State of Security in the Payment Industry • Encryption and Dynamic Authentication • Consumer Authentication Value (CAV) • Why CAV can help secure e-commerce

Add to Reading List

Source URL: www.chicagofed.org

- Date: 2011-10-03 15:05:59
    345United States Department of Homeland Security / Identity management / Computer security / FIPS 201 / Standards / E-Authentication / Credential / Identity assurance / Federal Information Security Management Act / Security / Public safety / Government

    Memorandum for the Heads of Executive Departments and Agencies

    Add to Reading List

    Source URL: www.whitehouse.gov

    Language: English - Date: 2011-02-18 10:33:44
    346Public key infrastructure / Certificate policy / Certificate server / Smart card / Two-factor authentication / Certificate authority / XUDA / Certisign / Cryptography / Key management / Public-key cryptography

    U. S. Department of Justice Information Technology Strategic Plan Appendix E Public Key Infrastructure

    Add to Reading List

    Source URL: www.justice.gov

    Language: English - Date: 2006-10-23 11:51:01
    347Internet / Spam filtering / Computing / Be Unlimited / Anti-spam techniques / Email authentication / Email / Spamming / Computer-mediated communication

    E-HUB Service Enrollment Form All customers must complete section one of the form and submit this information with your OTech Service Request. Customers who are providing their own licensing are also required to complet

    Add to Reading List

    Source URL: www.servicecatalog.dts.ca.gov

    Language: English - Date: 2013-06-28 15:37:20
    348Electronic commerce / Requisition / Password / E-procurement / Transaction authentication number / Government procurement in the United States / Tibco Software / Business / Procurement / Commerce

    Frequently Asked Questions Definitions for terms used in the FAQs Systems terms CFS: CBE:

    Add to Reading List

    Source URL: www.osec.doc.gov

    Language: English - Date: 2006-12-05 15:08:16
    349Computer security / Data / Cryptographic protocols / Cryptography standards / Wireless security / Extensible Authentication Protocol / Wi-Fi Protected Access / TACACS+ / Cisco Catalyst / Computing / Computer network security / Wireless networking

    FIPS[removed]Security Policy for Cisco Catalyst 6506, 6506-E, 6509, and 6509-E Switches with Wireless Services Modules (WiSMs) July 08, 2010 Version 2 .2

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2010-07-30 01:00:00
    350Federated identity / Internet protocols / Internet standards / EZproxy / Internet access / Library 2.0 / Online Computer Library Center / Proxy server / Lightweight Directory Access Protocol / Computing / Internet / Library science

    EZproxy EZproxy for authenticated access to your library’s e-content OCLC® EZproxy® authentication and access software allows your library to deliver secure user Web access to e-content simply and effectively. Avail

    Add to Reading List

    Source URL: www.oclc.org

    Language: English - Date: 2014-08-21 00:48:30
    UPDATE