E-Authentication

Results: 422



#Item
391Open government / Public administration / Technology / Identity / E-Government / Privacy / Identity theft / Internet privacy / Authentication / Ethics / Security / Identity management

Microsoft Word - igovt_report on public consultation_FINAL_March08.doc

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2014-03-03 22:29:03
392Electronic commerce / .fo / Automatic identification and data capture / Encodings / Portable Document Format / Computer security / QR code / Computing / Country code top-level domains / Security

Track & Trace, Authentication System FO-Security, Ein Geschäftsbereich der FO Print & Media AG | Gewerbestrasse 18 | 8132 Egg/ZH | Tel +[removed] | Fax +[removed] | E-Mail [removed] | www.fo-secur

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-10-09 09:41:09
393Auctioneering / Supply chain management / Systems engineering / Call for bids / E-procurement / Business Interoperability Interface / Government procurement / Tender notification / Public eProcurement / Business / Electronic commerce / Procurement

The e-TEG report glossary access control: [noun] One familiar use of authentication and authorization is access control. A computer system

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-04-26 05:11:32
394Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: [removed] 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:55
395Identification / Surveillance / Keystroke dynamics / Authentication / E-learning / Fingerprint / Password / Multi-factor authentication / Instructional design / Security / Biometrics / Education

INTERNATIONAL JOURNAL OF INSTRUCTIONAL TECHNOLOGY

Add to Reading List

Source URL: itdl.org

Language: English - Date: 2014-01-28 14:50:06
396Two-factor authentication / Security token / One-time password / Password / Authentication / Phishing / Password manager / Single sign-on / Security / Computer security / Access control

Vio-2Way | 2Factor Authentication - Product Guide E-Medical Records® Product Brief Tel: [removed], [removed]Email: [removed]

Add to Reading List

Source URL: www.seamfix.com

Language: English - Date: 2010-12-27 23:15:42
397Public-key cryptography / Key management / Blind signature / Electronic money / Coin / Key / United States dollar / Authentication / Digital signature / Cryptography / Financial cryptography / Cryptographic protocols

Preliminary Report on Chaum’s Online E-Cash Architecture A. W. Dent K. G. Paterson P. R. Wild Information Security Group Royal Holloway, University of London

Add to Reading List

Source URL: opencoin.org

Language: English - Date: 2013-03-16 05:29:38
398

What is e-mail authentication? John R. Levine Taughannock Networks FTC Authorization Summit

Add to Reading List

Source URL: www.taugh.com

- Date: 2004-11-16 16:05:10
    399Identification / Surveillance / Keystroke dynamics / Authentication / E-learning / Fingerprint / Password / Multi-factor authentication / Instructional design / Security / Biometrics / Education

    INTERNATIONAL JOURNAL OF INSTRUCTIONAL TECHNOLOGY

    Add to Reading List

    Source URL: www.itdl.org

    Language: English - Date: 2014-01-28 14:50:06
    400Identity / Technology / Computer security / Identity verification service / Online identity / E-Government / Authentication / Digital identity / Identity assurance / Internet privacy / Identity management / Security

    The Identity Bureau Identity Verification and Social Information The Internet as a mirror of life Trulioo Internet Life Verification

    Add to Reading List

    Source URL: www.trulioo.com

    Language: English - Date: 2014-05-02 19:04:04
    UPDATE