Electronic authentication

Results: 903



#Item
101Electronic engineering / Voice procedure / Telephone / Procedure word / Future of Wrestling / Worldwide Universities Network / Telecommunications engineering / NATO phonetic alphabet / Military communications / Technology / Amateur radio

PROWORD ALL AFTER ALL BEFORE AUTHENTICATE AUTHENTICATION IS

Add to Reading List

Source URL: www.hardscrabblefarm.com

Language: English - Date: 2009-02-12 21:01:36
102Technology / Business / Password / QuickBooks / Transaction authentication number / Bank / Electronic commerce / Finance / Accounting software / Online banking

Cheaha Bank is proud to introduce our NEW, state-of-the-art Online Banking system, designed to make your navigation easier and more attractive. Available at www.cheahabank.com, this new system allows you to access accoun

Add to Reading List

Source URL: www.cheahabank.com

Language: English - Date: 2015-03-11 11:58:20
103Key management / Authentication / Digital signature / Non-repudiation / Electronic authentication / Key / Cryptography / Public-key cryptography / Notary

This rule was filed as 1 NMACTITLE 1 CHAPTER 12 PART 7 GENERAL GOVERNMENT

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2009-11-05 18:43:35
104Security / Computer security / Electronic commerce / Password manager / Two-factor authentication / Password / Online banking / Access control

ONE VISION ONE CULTURE ONE BRAND ONE SYSTEM ONE BANK

Add to Reading List

Source URL: www.cathaybank.com

Language: English - Date: 2013-07-26 16:32:45
105Business / Finance / SEC filings / Banking / Electronic commerce / Investment / Deposit account / Internet privacy / Payment systems

Microsoft Word - E-Statement Authentication Code Disclosure-2.doc

Add to Reading List

Source URL: secure.profitstarscms.com

Language: English - Date: 2009-12-30 12:45:39
106Cryptography standards / Computer network security / Drug Enforcement Administration / Drug policy of the United States / Electronic Prescriptions for Controlled Substances / FIPS 140-2 / Password / Two-factor authentication / Medical prescription / Security / Cryptography / Computer security

Electronic Prescription for Controlled Substances: A Cybersecurity Perspective Samuel Tan, Rebecca Shapiro, Sean W. Smith Dartmouth College Abstract The Electronic Prescription for Controlled Substances (EPCS) is a set o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-09-11 09:10:48
107Technology / Radio resource management / Channel / Information theory / Probability / Cognitive radio / Probability and statistics / Telecommunications engineering / Electronic engineering

PRIMARY USER AUTHENTICATION METHODS FOR MOBILE COGNITIVE RADIO NETWORKS by Swathi Chandrashekar A Thesis Submitted to the Faculty of the

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2012-08-28 02:38:07
108Computer network security / Computing / Crime prevention / National security / Email / Password / Transaction authentication number / Fax / Computer security / Technology / Security / Electronic commerce

Data Transmission Procedures OctoberBackground and general principles This document sets out the security issues that BAPAM personnel (staff, clinicians, volunteers)

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2014-12-17 07:31:40
109Internet / Spamming / Electronic documents / File sharing networks / Bitcoin / Peer-to-peer computing / Public-key cryptography / Communications protocol / Peer-to-peer / Computing / Email / Computer-mediated communication

      Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

Add to Reading List

Source URL: www.bitmessage.org

Language: English - Date: 2013-07-30 20:37:14
110Cryptographic protocols / Electronic commerce / X.509 / Diffie–Hellman key exchange / Public key infrastructure / Man-in-the-middle attack / Key authentication / Public key certificate / Key / Cryptography / Key management / Public-key cryptography

Lecture 13: Certificates, Digital Signatures, and the Diffie-Hellman Key Exchange Algorithm Lecture Notes on “Computer and Network Security” by Avi Kak () February 26, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-02-26 14:50:25
UPDATE