E-Authentication

Results: 422



#Item
81Economy / Financial services / Money / Online banking / E-commerce / Computer access control / Payment systems / Transaction authentication number / Password / Cash machine / Computer security / Bank

E-banking security notice The following information will help you increase the security of your bank transactions on the Internet. Please observe this information when using the Internet and particularly when making use

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2015-12-08 09:42:10
82Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Counterfeit consumer goods / Counterfeit / Authentication

Synchronized Secrets Approach for RFID-enabled Anti-Counterfeiting A. Ilic, M. Lehtonen, F. Michahelles, E. Fleisch ETH Zurich, Information Management, CH-8092 Zurich, Switzerland {ailic,mlehtonen,fmichahelles,efleisch}@

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:03:26
83Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

+entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2016-01-14 11:24:30
84Cryptography / Key management / Public key infrastructure / Public-key cryptography / Pharmaceutical industry / E-commerce / Public key certificate / Email / Authentication / Negotiation / Validation

Authorized Negotiator/Contract Administrator Updates Version 1.0 This document will explain the Authorized Negotiators/Contract Administrators enhancements that will be available in the November 2012 Release.

Add to Reading List

Source URL: eoffer.gsa.gov

Language: English - Date: 2014-04-22 14:22:59
85

DIGIPASS DIGIPASS Nano Hardware based authentication with e-signature functionality for your mobile phone to address security challenges of mobile applications Mobile banking applications face multiple challenges. In or

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:00
    86Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Certification Practice Statement / Certificate policy / Public key certificate / Revocation list / Professional certification / Root certificate / Authentication

    CERTIFICATION PRACTICE STATEMENT (CPS) Published by eMudhra Limited 3rd Floor, Sai Arcade, Outer Ring Road, Devarabeesanahalli Bengaluru, Karnataka, India

    Add to Reading List

    Source URL: www.e-mudhra.com

    Language: English - Date: 2015-06-30 02:40:54
    87Internet privacy / PGP / Pretty Good Privacy / Students for a Democratic Society / Internet / SDS-PAGE / Computing / Scientific Data Systems / Samsung SDS / Computer security / Cryptographic software / Email authentication

    SDS E-Business Server™ Research report by Clabby Analytics October 2012 Clabby Analytics Research Report

    Add to Reading List

    Source URL: www.sdsusa.com

    Language: English - Date: 2015-02-13 13:30:30
    88Internet protocols / Two-factor authentication / Single sign-on / RADIUS / Authentication / Password / Multi-factor authentication / Extensible Authentication Protocol / Identity management / Security / Computer security / Access control

    C OD E42 T E C HN O LO GY N OT E Two-factor Authentication Increases security, decreases risk

    Add to Reading List

    Source URL: essentials.code42.com

    Language: English
    89

    The access to above 40,000 e-books provided by Higher Education Commission is available to institutions registered with HEC Digital Library only. The access is enabled through IP authentication so there is no username an

    Add to Reading List

    Source URL: www.digitallibrary.edu.pk

    Language: English - Date: 2009-03-12 02:19:06
      90

      The Emperor’s New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies∗† Stuart E. Schechter Rachna Dhamija

      Add to Reading List

      Source URL: usablesecurity.org

      Language: English - Date: 2007-02-04 18:36:52
        UPDATE