E-Authentication

Results: 422



#Item
351Cryptographic software / Public-key cryptography / Authentication / Data Encryption Standard / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / FIPS 140

Thales e-Security Datacryptor ® 2000 Datacryptor ® 2000 FIPS[removed]Security Policy Datacryptor ® 2000

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
352E-book / Interlibrary loan / Library / Authentication / Librarian / Publishing / Library science / Science / Security

Rhode Island OLIS presentation April 29, 2014 Risk to Resource Sharing • Flattening of circulation and Ill for physical items after years of double-digit growth

Add to Reading List

Source URL: lgdata.s3-website-us-east-1.amazonaws.com

Language: English - Date: 2014-05-03 07:54:25
353Computer network security / Data security / Privacy / National security / E-Verify / Authentication / Security controls / United States Department of Homeland Security / Employer Identification Number / Security / Computer security / Public safety

Data Privacy & Integrity Advisory Committee Options for Verifying the EIN or Otherwise Authenticating the Employer in the E-Verify Program December 3, 2008 Report No[removed]

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2008-12-23 14:35:42
354CMAC / Triple DES / CBC-MAC / K1 / Rocky Mountain Athletic Conference / Message authentication codes / Cryptography / Atta

An Analysis of RMAC Ja k Lloyd� Novem e 18, 2002 ������ �

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-01 16:24:44
355Human–computer interaction / Technical communication / Usability / Technology / Authentication / Proxy server / Internet privacy / Security / Computing

CDL Web and Telephone Helpline Feedback Summary November[removed]E. Meltzer A total of 86 comments/feedback/questions came into the University of California - California Digital Library during a one-week period from Fri

Add to Reading List

Source URL: www.cdlib.org

Language: English - Date: 2012-12-14 18:31:11
356E-Verify / Privacy / Government officials / Legal professions / Ombudsman / Authentication / Authorization / Identity theft / Security / Law / Ethics

Main Street Partnership Policy Paper: ENHANCED E-VERIFY—ESSENTIAL ELEMENT OF IMMIGRATION REFORM Worksite Verification—Why?  Jobs are the main magnet for unauthorized entries and overstays (and jobs are essential

Add to Reading List

Source URL: www.republicanmainstreet.org

Language: English - Date: 2013-08-22 21:46:17
357Government / National Institute of Standards and Technology / United States government secrecy / Data security / FIPS 201 / E-Authentication / Personally identifiable information / OMB Circular A-130 / Federal Information Security Management Act / Security / Computer security / National security

MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2012-11-02 14:38:17
358Government / National Institute of Standards and Technology / United States government secrecy / Data security / FIPS 201 / E-Authentication / Personally identifiable information / OMB Circular A-130 / Federal Information Security Management Act / Security / Computer security / National security

MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2005-08-10 15:08:08
359Federated identity / Identity management / E-Authentication / Public administration / Two-factor authentication / Authentication / Electronic authentication / Single sign-on / Multi-factor authentication / Security / Computer security / Access control

e-Pramaan: Framework for e-Authentication Document No: e-Pramaan: 01 Document No: e-Pramaan: 01 Version: 1.0 October, 2012

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2012-11-28 23:32:40
360Web applications / Web development / Access control / Authentication / Notary / Packaging / Electronic signature / Electronic commerce / Email / Security / Computing / Technology

The Paris Recommendations September 13, 1999 Paris 1999 Recommendations Table of Contents

Add to Reading List

Source URL: www.gbd-e.org

Language: English - Date: 2008-05-23 18:00:48
UPDATE