Electronic authentication

Results: 903



#Item
171Data / Information / Secure communication / Internet standards / Electronic commerce / Transport Layer Security / Authentication protocol / Cipher suite / Password authentication protocol / Cryptographic protocols / Cryptography / Internet protocols

Generic Compilers for Authenticated Key Exchange∗ Tibor Jager Florian Kohlar Sven Sch¨age

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-02 08:15:58
172Cryptographic protocols / Computer security / Computing / Yahoo! / Electronic documents / DomainKeys Identified Mail / Author Domain Signing Practices / DomainKeys / Domain Name System / Email authentication / Spam filtering / Cryptography

Internet Engineering Task Force (IETF) Request for Comments: 6541 Category: Experimental ISSN: M. Kucherawy

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2012-02-29 13:57:51
173National security / Computer network security / Cyberwarfare / Electronic commerce / Password / Information security / Scottrade / Spyware / Transaction authentication number / Security / Espionage / Crime prevention

We understand how important information security and privacy are to you. To provide you with greater peace of mind, we have developed the Scottrade Online Security Guarantee. If an unauthorized transaction is conducted o

Add to Reading List

Source URL: www.scottrade.com

Language: English - Date: 2013-05-16 18:54:16
174Counterfeit consumer goods / Electronic commerce / Automatic identification and data capture / Communication design / Counterfeit / Parallel import / Authentication / Online shopping / Barcode / Business / Security / Marketing

Touxhscreen Black Background

Add to Reading List

Source URL: authenticateit.com

Language: English - Date: 2014-06-11 04:22:04
175Transaction authentication number / Finance / Electronic commerce / Demat account / Money / Economics / Payment systems / Password / Direct debit

Advance Logo_Freestanding_Reversed

Add to Reading List

Source URL: www.advance.com.au

Language: English - Date: 2014-07-01 02:51:56
176Payment systems / Mobile telecommunications / SMS / Text messaging / Online banking / Mobile phone / Transaction authentication number / SMS banking / Mobile banking / Technology / Mobile technology / Electronic commerce

MarchFraud via Mobile Phone Porting This topic has been on our list of things to share with you via our regular newsletters for some months and has finally made it to the top of

Add to Reading List

Source URL: lifestrategies.net.au

Language: English - Date: 2015-03-17 01:14:14
177Business / Electronic commerce / Embedded systems / Mobile telecommunications / Mobile payments / Mobile banking / Branchless banking / Mobile Payments in India / SMS / Technology / Payment systems / Mobile technology

Practical Receipt Authentication for Branchless Banking Saurabh Panjwani, Bell Labs India, ABSTRACT

Add to Reading List

Source URL: dev3.acmdev.org

Language: English - Date: 2012-12-14 00:46:06
178Mobile technology / Electronic engineering / System Architecture Evolution / LTE Advanced / Diameter / 3GPP Long Term Evolution / Mobile virtual network operator / 3GPP / User equipment / Universal Mobile Telecommunications System / Technology / Internet Protocol

MARBEN DIAMX GATEWAY THE RELIABLE GATEWAY SYSTEM FOR DIAMETER INTERCONNECTIVITY CARRIER GRADE DIAMETER MEDIATION GATEWAY FOR RAPIDLY INTERCONNECTING MOBILE NETWORK OPERATORS SYSTEMS - BILLING, CHARGING, AUTHENTICATION- T

Add to Reading List

Source URL: www.marben-products.com

Language: English - Date: 2014-04-22 10:11:10
179Electronic commerce / Financial cryptography / Digital credential / Credential / Electronic authentication / Digital signature / Blind signature / Cryptographic protocol / Authentication / Cryptography / Identity management / Public-key cryptography

A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica February 20, 2002 Abstract

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2007-02-16 10:07:45
180Secure communication / Cryptographic protocols / HTTP / Electronic commerce / Java platform / Digest access authentication / HTTP Secure / Certificate authority / Cross-site scripting / Cryptography / Security / Computing

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
UPDATE