Electronic authentication

Results: 903



#Item
221Electronic signature / Computer law / Notice of electronic filing / Digital signature / Electronic Signatures in Global and National Commerce Act / Electronic commerce / Posting rule / Digital Signature and Electronic Authentication Law / Cryptography / Law / Legal documents

Republic of the Philippines Congress of the Philippines Metro Manila Eleventh Congress Second Regular Session Begun and held in Metro Manila, on Monday, the twenty-sixth day of July,

Add to Reading List

Source URL: www.ombudsman.gov.ph

Language: English - Date: 2014-12-15 23:34:03
222Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
223Secure communication / Computing / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / HTTP Secure / Public-key cryptography / Mutual authentication / Dynamic SSL / Cryptography / Security / Cryptographic protocols

“Only one Tool in the Toolbox!” White Paper CASQUE MSC- Mutually Authenticated Secure Communications Distributed Mangement Systems Ltd, January[removed]How do you access a secure web site or setup a secure connection?

Add to Reading List

Source URL: www.casque.co.uk

Language: English - Date: 2015-01-06 05:47:43
224Access control / Federated identity / Public administration / Authentication / Identity document / Credential / Electronic authentication / Digital identity / Biometrics / Security / Identity management / Identity

Report to the Council of Australian Governments: A Review of the National Identity Security Strategy

Add to Reading List

Source URL: www.ag.gov.au

Language: English - Date: 2015-03-22 22:52:13
225Electronic publishing / E-books / OverDrive /  Inc. / Retailers / OverDrive Media Console / EPUB / Adobe Digital Editions / Tablet computer / Mobipocket / Computing / Computer file formats / Publishing

Get started with digital titles All you need to borrow titles from the digital collection is an internet connection and your authentication requirements (ex: corporate ID; email and password; company username.)

Add to Reading List

Source URL: www.homegroundvillages.com.au

Language: English - Date: 2014-05-29 05:33:27
226Certificate authorities / Comodo Group / Electronic commerce / Computer security / Public key certificate / Code signing / Comodo / S/MIME / GlobalSign / Cryptography / Key management / Public-key cryptography

Cost-Effective PKI Certificates Give IT Powerful Control over Application Usage and a Seamless Experience for End Users When Open Finance Network needed Digital Client Authentication Certificates - one for every financia

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
227Business / Payment systems / Certificate authorities / Comodo Group / Two-factor authentication / Electronic commerce / Online banking / Authentication / Automated teller machine / Technology / Security / Web applications

A Priority on Customer Service Made Digital Certificates the Only Choice for BankNewport “It’s as close as you can get to perfect and seamless.” Nelson Teixeira, VP, Direct Banking and eCommerce, BankNewport about

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-07-25 21:23:05
228Technology / Wi-Fi / Extensible Authentication Protocol / Access network / Wireless access point / Electronics / Wireless security / Devicescape Software / Network access / Wireless networking / Electronic engineering

Press Release – For immediate use March 18, 2013 Press Contacts (Japan): Takehiko Kato NEC Corporation [removed] +[removed]

Add to Reading List

Source URL: www.roec.tohoku.ac.jp

Language: English - Date: 2013-08-06 02:30:46
229Computing / Technology / Business / Credit card / Two-factor authentication / Electronic commerce

ABOUT EDENTITI DESPITE THE HUGE STRIDES THAT HAVE BEEN MADE IN ONLINE SECURITY, PROBLEMS PERSIST OVER THE DIFFICULTY OF VERIFYING WHETHER SOMEONE ONLINE IS ACTUALLY THE PERSON THEY CLAIM TO BE. PASSWORDS CAN BE FORGED OR

Add to Reading List

Source URL: www.epicorp.com.au

Language: English - Date: 2006-07-10 14:53:10
230Electronic commerce / Email authentication / Public key certificate / Certificate authority / S/MIME / Digital signature / Man-in-the-middle attack / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Key management

Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan University of Birmingham, UK CloudTomo Ltd.

Add to Reading List

Source URL: www.computer-science.birmingham.ac.uk

Language: English - Date: 2013-12-10 12:27:25
UPDATE