E-Authentication

Results: 422



#Item
51Cryptography / E-commerce / Information privacy / Payment cards / National security / Payment Card Industry Data Security Standard / Data security / Internet security / Information security / Computer security / Password / Multi-factor authentication

Microsoft Word - PCI DSS v1 1.doc

Add to Reading List

Source URL: pcidss.ru

Language: English - Date: 2013-11-15 09:18:09
52Computer access control / Biometrics / Identification / Surveillance / Data security / Authentication / Strong authentication / Biometric Tokenization / Biometric passport

Trusted BWI: Privacy and Trust Enhanced Biometric Web Identities Abdullah A. Albahdal, Hamdan Alzahrani, Lalit Prithviraj Jain, and Terrance E. Boult University of Colorado at Colorado Springs Colorado Springs, CO 80918

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:56:27
53Payment systems / E-commerce / Online banking / Computer access control / Cheque / Security token / Transaction authentication number / Internet fraud / Alternative payments / Giropay

Reference Guide – Business Online Banking Welcome to safer internet banking As online fraud becomes increasingly sophisticated our security measures need to advance to combat these crimes.

Add to Reading List

Source URL: www.co-operativebank.co.uk

Language: English - Date: 2014-07-01 05:27:35
54EMC Corporation / E-commerce / Identity theft / Crimes / Deception / RSA Security / RSA / Fraud / Internet fraud / Authentication / Computer security

RSA eFraudNetwork Proactive Fraud Protection ® TM

Add to Reading List

Source URL: www.ndm.net

Language: English - Date: 2013-09-30 12:31:49
55Biometrics / Surveillance / Private biometrics / Security / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
56Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
57Computer access control / Identity management / Metadata standards / Signature / Security Assertion Markup Language / EIDAS / Authentication / Password

Security aspects of CLIPS Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-03-07 06:09:16
58Information privacy / Payment cards / E-commerce / Computer law / Payment Card Industry Data Security Standard / Payment systems / Payment Card Industry Security Standards Council / Payment card industry / Conventional PCI / PA-DSS / DSS / Multi-factor authentication

PCI DSS 3.2 Resource Guide The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during and after purcha

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-04-28 11:41:13
59Signature / Cryptography standards / Public-key cryptography / E-commerce / Computer law / Public key certificate / Authentication / Electronic signature / FIPS 140-2 / Digital signature / Qualified electronic signature / RSA SecurID

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-07-09 04:32:36
UPDATE