Electronic authentication

Results: 903



#Item
151Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2011-05-24 15:35:31
152Advanced Encryption Standard / Power analysis / Side channel attack / Microcontrollers / Stream ciphers / Message authentication codes / Joint Test Action Group / Field-programmable gate array / TI MSP430 / Cryptography / Electronic engineering / Electronics

In the blink of an eye: There goes your AES key (DRAFT of 28 MaySergei Skorobogatov Christopher Woods

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-05-28 10:41:12
153Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
154Skin physiology / Security / Password / Authentication / Electronic test equipment / Technology / Skin conductance

Mobile Security Through Passive Sensing

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-11-29 15:01:05
155Email / Internet / Public-key cryptography / Electronic documents / S/MIME / Email client / ID-based encryption / Cryptography / Computing / Email authentication

User-Level_S:MIME Encryption

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2011-05-24 15:35:31
156Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
157Health informatics / Security token / Two-factor authentication / Electronic prescribing / Authentication / Biometrics / Electronic medical record / One-time password / Multi-factor authentication / Security / Health / Access control

DATA SHEET CA Technologies and BIO-key™ Solution for Secure Electronic Prescribing of Controlled Substances At a Glance

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-19 14:10:15
158Financial services / Mobile banking / Mobile content / Online banks / Payment systems / Bank / Password / Online banking / Two-factor authentication / Technology / Electronic commerce / Business

For Witnessing Bank Use Only Name of Witnessing Bank: Name of PIC BANK OF CHINA (Hong Kong) LIMITED (the “Bank”) is a bank incorporated in the Hong Kong Special Administrative

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-01-17 13:08:44
159Password / Two-factor authentication / One-time password / Payment systems / Electronic commerce / Authentication / Chip Authentication Program / 3-D Secure / Security / Cryptography / Access control

4.1 Application Method Primary User (PU) * Delegated User (DU) * The application can be facilitated

Add to Reading List

Source URL: www.ncb.com.hk

Language: English - Date: 2012-06-29 03:31:19
160Topaz / Fingerprint / Electronic signature / Authentication / Liquid crystal display / Red Digital Cinema Camera Company / Security / Fingerprints / Biometrics

IDGem LCD 1x5 MODEL TF-LBK464-HSB-R DESCRIPTION

Add to Reading List

Source URL: www.topazsystems.com

Language: English - Date: 2014-10-29 18:53:12
UPDATE