Electronic authentication

Results: 903



#Item
251Electronic engineering / Internet / RADIUS / Videotelephony / Network access server / Access token / H.323 / Authentication / Internet protocols / Computing / Internet standards

PortaSwitch: External System Interfaces Guide MR45

Add to Reading List

Source URL: www.portaone.com

Language: English - Date: 2015-01-23 05:56:49
252Technology / Finance / Electronic commerce / Banking / Investment / Banking agent / Mobile banking / Transaction authentication number / Origin / Payment systems

Revised – December 2011 Deutsche Bank AG Autobahn Terms and Conditions of Use THIS PLATFORM IS PROVIDED BY DEUTSCHE BANK AG (AS FURTHER DESCRIBED IN CLAUSE 18) ON ITS OWN BEHALF AND ON BEHALF OF ANY MEMBERS OF ITS GROU

Add to Reading List

Source URL: autobahn.db.com

Language: English - Date: 2015-01-19 05:29:33
253Electronic commerce / Embedded systems / Password / SMS banking / Authentication / Online banking / Transaction authentication number / Identity theft / Automated teller machine / Technology / Payment systems / Security

When must you notify us? As soon as you become aware or suspect that: • Your PIN or any other codes or password you use with your account becomes known to someone else. • Your card or Authentication Device had been

Add to Reading List

Source URL: www.nab.com.au

Language: English - Date: 2015-03-21 21:27:57
254Authentication / Notary / Packaging / Electronic authentication / Password / Security token / One-time password / Transaction authentication number / Multi-factor authentication / Security / Computer security / Access control

Electronic Authentication Animations– Verify Identity (Script) Introduction Electronic transaction (e-transaction) means convenience as well as efficiency to many people. To ensure e-transaction is conducted in a reli

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-06 21:28:19
255Mobile telecommunications / Identity management / ISO standards / Ubiquitous computing / Smart cards / Electronic identity card / Mobile payment / Two-factor authentication / Identity document / Technology / Cryptography / Security

GOVERNMENT PROGRAMS WHITE PAPER National Mobile ID schemes Volume I

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-02-20 12:42:02
256Identity management / Authentication / Notary / Packaging / Two-factor authentication / Federated identity / Password / Electronic authentication / Multi-factor authentication / Security / Cryptography / Access control

Electronic Authentication Animations – Two-factor Authentication (Script) Introduction Joe needs to implement an e-authentication module in an information system. colleague Alan introduces the three basic authenticati

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
257Notary / Electronic commerce / Digital signature / Public key certificate / Electronic Signatures in Global and National Commerce Act / Authentication / Electronic signature / Uniform Electronic Transactions Act / Cryptography / Public-key cryptography / Key management

CONSOLIDATED TO 1 DECEMBER 2014 LAWS OF SEYCHELLES ELECTRONIC TRANSACTIONS ACT [20th December, 2001] Act 8 of 2001 S.I. 38 of 2001

Add to Reading List

Source URL: zoupio.lexum.com

Language: English
258Notary / Electronic commerce / Public key certificate / Authentication / Digital signature / Electronic signature / Signature / Electronic authentication / Cryptography / Key management / Public-key cryptography

Opinion_V-Kment_edited_11th_Dec2012

Add to Reading List

Source URL: www.vkc.cz

Language: English - Date: 2013-04-18 19:51:23
259Digital signature / Public key certificate / X.509 / Certificate server / Revocation list / Authentication / Certificate authority / Electronic signature / Public key infrastructure / Cryptography / Public-key cryptography / Key management

AuditorePass Order Documents Online Creating a Digitally

Add to Reading List

Source URL: auditorepass.com

Language: English - Date: 2009-07-08 14:36:08
260Electronics / Electronic engineering / Android / Embedded Linux / Samsung Electronics / Two-factor authentication / Mobile device management / Smartphones / Technology / Android devices

Samsung KNOX – First Dual Persona Interface on Android Platform Introduction: Hong Kong businesses aware the benefits of Bring Your Own Device (BYOD) such as increase of productivity and cost reduction, but security an

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:41
UPDATE