Electronic authentication

Results: 903



#Item
11Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
12IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
13+entrust.com/enterprise Entrust IdentityGuard for Enterprise

+entrust.com/enterprise Entrust IdentityGuard for Enterprise

Add to Reading List

Source URL: www.entrustdatacard.com

Language: English - Date: 2016-02-11 14:34:23
14Mobile multifactor security  A revolution in authentication and digital signing Mobile multifactor security

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
15ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
16Watermarking of Electronic Text Documents Mohan S Kankanhalli & K.F Hau School of Computing National University of Singapore, SingaporeEmail:

Watermarking of Electronic Text Documents Mohan S Kankanhalli & K.F Hau School of Computing National University of Singapore, SingaporeEmail:

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-04-25 01:40:31
17ParentPaperwork Two Factor Authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
18Confirmation pursuant to § 18 para. 5 SigG

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
19Essential Quality Control Strategies for Combatting Counterfeit Components  Counterfeit electronic components remains the primary threat to the supply chain,

Essential Quality Control Strategies for Combatting Counterfeit Components Counterfeit electronic components remains the primary threat to the supply chain,

Add to Reading List

Source URL: www.harrykrantz.com

Language: English - Date: 2013-05-21 11:28:48
20Technical_Implementation_Guide_standardWebService_V4_Systempay_V1.4b

Technical_Implementation_Guide_standardWebService_V4_Systempay_V1.4b

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2015-01-26 09:14:56