E-Authentication

Results: 422



#Item
401Computer-mediated communication / Spamming / Email service provider / Email spam / Email marketing / Spam / Gmail / Email authentication / Anti-spam techniques / Email / Computing / Internet

Un de r th e sk in of em ail de liver ab ilit y March 2011 White (Account Director)

Add to Reading List

Source URL: www.redcmarketing.net

Language: English - Date: 2011-05-09 11:14:07
402Security / Law / Access control / Authentication / Notary / Packaging / Photo manipulation / Image editing / Pornography / Digital photography / Visual arts / Image processing

Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document, or any portion ther

Add to Reading List

Source URL: www.crime-scene-investigator.net

Language: English - Date: 2011-10-28 14:25:00
403DEAL / Phelix / Twofish / Lecture Notes in Computer Science / Advanced Encryption Standard / Fast Software Encryption / Cryptographic hash function / Cryptography / Stream ciphers / Stefan Lucks

Publications by Stefan Lucks Books and Chapters in Books 1. A. Weimerskirch, D. Westhoff, S. Lucks, E. Zenner, “Efficient Pairwise Authentication Protocols for Sensor Networks: Theory and Performance Analysis”, IEEE

Add to Reading List

Source URL: th.informatik.uni-mannheim.de

Language: English - Date: 2006-06-20 09:24:04
404Security / Technology / E-procurement / Government procurement in the European Union / Password / Web portal / Government procurement / Authentication / Single sign-on / Business / Electronic commerce / Procurement

Part II: Process Recommendations

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-12-07 05:33:28
405Business / 3-D Secure / EMV / Chip and PIN / Card security code / MasterCard / Chip Authentication Program / Bank card number / Authentication / Payment systems / Electronic commerce / Merchant services

E-commerce Security ADVANTAGES OF A RISK BASED AUTHENTICATION STRATEGY FOR MASTERCARD SECURECODE Purpose

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2011-07-18 03:48:34
406Web applications / Yahoo! Mail / Yahoo! / Password / Knowledge-based authentication / Software / Computing / World Wide Web

Microsoft Word - E-Mail Handout.doc

Add to Reading List

Source URL: www.alaeditions.org

Language: English - Date: 2011-03-14 16:41:07
407Finance / Electronic commerce / Transaction authentication number / Password / Banking / Overdraft / Bank / Direct debit / SMS banking / Technology / Payment systems / Business

EMPORIKI BANK-CYPRUS LTD TERMS AND CONDITIONS OF e.Banking SERVICE The present Terms and Conditions apply to the services of Emporiki Bank – Cyprus Ltd (hereunder called the “Bank”), offered through e.Banking Servi

Add to Reading List

Source URL: www.emporikicyprus.com

Language: English - Date: 2013-03-11 02:09:00
408Fraud / Social engineering / Payment systems / Authentication / Notary / Credit card fraud / Anomaly detection / Risk-based authentication / Identity theft / Security / Cryptography / Access control

W H I T E PA P E R VeriSign® Identity Protection Fraud Detection Service An Overview

Add to Reading List

Source URL: complianceandprivacy.com

Language: English - Date: 2007-03-03 10:21:37
409Password / Single sign-on / Two-factor authentication / Authentication / Password manager / Password fatigue / Security / Computer security / Access control

TOOLS4EVER.3012_E-SSOM_infographic_sketch_V3

Add to Reading List

Source URL: www.tools4ever.com

Language: English - Date: 2013-07-29 16:14:44
410Federated identity / Single sign-on / Password / Two-factor authentication / Security token / Self-service password reset / Active Directory / Common Authentication Service Adapter / Password manager / System software / Computer security / Security

TECHNICAL LEAFTLET Enterprise Single Sign On Manager (E-SSOM) Tools4ever’s Enterprise Single Sign On Manager (E-SSOM) comprises a number of functional modules. It’s possible to begin with the most user-friendly and v

Add to Reading List

Source URL: www.tools4ever.com

Language: English - Date: 2013-05-22 16:06:02
UPDATE