E-Authentication

Results: 422



#Item
371

USING DISTRIBUTED COMPUTING INFRASTRUCTURES IS NOW STRAIGHTFORWARD! T H E A F R I CA G R I D S C I E N C E GAT E WAY : E - I N F R AS T R U CT U R E S M A D E S I M P L E ! Simple authentication

Add to Reading List

Source URL: ei4africa.eu

Language: English - Date: 2013-12-13 08:41:52
    372Revocation list / Public key certificate / Certificate authority / Authentication / Certificate policy / Cryptography / Public-key cryptography / Key management

    EUROPEAN COMMISSION JOINT RESEARCH CENTRE Institute for the Protection and Security of the Citizen Traceability and Vulnerability Assessment Unit T.E.M.P.E.S.T Laboratory TP 361

    Add to Reading List

    Source URL: dtc.jrc.ec.europa.eu

    Language: English - Date: 2012-06-13 10:17:00
    373Electronic commerce / Certificate authority / Public key certificate / Credit card / Email / Authentication / Certificate policy / Cryptography / Key management / Public-key cryptography

    IdenTrust W E P UT T HE T RUST I N I DENTIT Y ™ D-TRADE ACES

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2014-05-09 17:59:07
    374Transaction authentication number / Transactional account / Business / Investment / Electronic commerce / Mobile payments / Embedded systems / Payment systems / Banking / Finance

    Microsoft Word[removed]E-File Request[removed]docx

    Add to Reading List

    Source URL: www.flhsmv.gov

    Language: English - Date: 2014-06-24 09:53:10
    375United States administrative law / Surveillance / Government / National Security Agency / NIST Special Publication 800-53 / Government procurement in the United States / E-Authentication / Security / Personal life / Personally identifiable information

    UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL THE INSPECTOR GENERAL October 12, 2006 The Honorable Karen S. Evans

    Add to Reading List

    Source URL: www.ignet.gov

    Language: English - Date: 2006-10-13 17:55:48
    376Computer security / Federated identity management / Digital identity / E-Authentication / Authentication / Federated identity / Information security / Access control / Security Assertion Markup Language / Identity management / Security / Identity

    State Identity Credential and Access Management (SICAM) Guidance and Roadmap State Identity Credential and Access Management (SICAM) - Guidance and Roadmap Version 1.0

    Add to Reading List

    Source URL: www.nascio.org

    Language: English - Date: 2012-09-25 08:40:22
    377

    USING DISTRIBUTED COMPUTING INFRASTRUCTURES IS NOW STRAIGHTFORWARD! T H E A F R I CA G R I D S C I E N C E GAT E WAY : E - I N F R AS T R U CT U R E S M A D E S I M P L E ! Simple authentication

    Add to Reading List

    Source URL: ei4africa.eu

    Language: English - Date: 2014-01-30 04:29:04
      378E-Verify / Privacy / Two-factor authentication / Authentication / Password / Identity document / Finger vein recognition / Biometric passport / Security / Access control / Biometrics

      Testimony before the House Committee on Ways and Means Subcommittee on Social Security: Social Security Administration’s Role in Verifying Employment Eligibility 14 April 2011

      Add to Reading List

      Source URL: usacm.acm.org

      Language: English - Date: 2011-05-31 13:31:46
      379MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

      On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

      Add to Reading List

      Source URL: homepages.cs.ncl.ac.uk

      Language: English - Date: 2011-12-25 18:38:22
      380One-time password / Security token / Gemalto / Two-factor authentication / Password / Keystroke logging / Multi-factor authentication / Authentication / Password manager / Security / Computer security / Access control

      One Time Password for Secure Network Access I Full Portfolio of OTP Solutions for Every Business Use Case FINANCIAL S ERVICES & RETAIL ENTE RP RIS E > SOLUTION

      Add to Reading List

      Source URL: www.simagine.axalto.com

      Language: English - Date: 2011-02-14 10:02:08
      UPDATE