Electronic authentication

Results: 903



#Item
31Identity management / Computer access control / Computer security / Identity / Electronic identification / Authentication / Mobile signature / Recommender system / Multi-factor authentication / Digital identity / Privacy

Microsoft Word - SSEDIC Outcomes Y3 WP6_3v1 6.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:04
32Cryptography / Key management / Public-key cryptography / Transport Layer Security / Public key infrastructure / Certificate authority / IdenTrust / Root certificate / Public key certificate / Authentication

IdenTrust™ Certificate Enablement Toolkit Rapid Integration and Certification Certificate enablement and IdenTrust™Compliant Certification Made Easy As the electronic world becomes increasing more prone to fraud,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:52:40
33Cryptography standards / Computer law / Signature / E-commerce / Regulation / EIDAS / Public key certificate / Electronic signature / Authentication / Trust service provider / Draft:Test Qualified digital certificate

European Regulation on Electronic Título de presentación Identification and Trust Services Raúl Rubio Nombre Baker

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
34Educational psychology / Psychometrics / Information technology / Tests / Standardized tests / Authentication / Electronic assessment / Prelims / Questionnaire / Educational technology / Academic dishonesty

Assessments in the 21st Century: No more cheating during e- Examinations!!! Aarthi Nagappan Faculty of Education and Distance Learning, Botho University, Gaborone, Botswana

Add to Reading List

Source URL: www.21caf.org

Language: English - Date: 2015-09-24 16:27:51
35Types of business entity / Computer access control / Notary / Access control / Authentication / Packaging / Civil law notary / Email / Gesellschaft mit beschrnkter Haftung / Limited liability company / Mail / Electronic authentication

If you would like to purchase shares/interest in a shelf company/limited partnership, please complete this form in full and send it to DNotV GmbH. We will reserve the next available company for you after receipt. Prepara

Add to Reading List

Source URL: www.dnotv.de

Language: English - Date: 2016-06-07 05:08:20
36Mobile telecommunications / 5G / Technology forecasting / Computer network security / Next Generation Mobile Networks / Security / Authentication / Computer security / Hotspot / Password / Electronic authentication / Wireless security

SIMalliance-Mobile-Open-API-Paper-V2_FINAL

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-02-18 04:21:13
37Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

Add to Reading List

Source URL: hdm.io

Language: English - Date: 2015-12-05 20:38:27
38E-commerce / Payment systems / Financial cryptography / Ubiquitous computing / Public-key cryptography / Radio-frequency identification / Contactless smart card / Ecash / Smart card / Digital signature / Authentication / Electronic money

Pay As You Go Foteini Baldimtsi1 , Gesine Hinterw¨alder2 , Andy Rupp3 , Anna Lysyanskaya1 , Christof Paar2,4 , Wayne P. Burleson2 1 Computer Science Department, Brown University

Add to Reading List

Source URL: vcsg.ecs.umass.edu

Language: English - Date: 2012-10-24 17:25:20
39Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28
40Identity management / Computer access control / Federated identity / Digital technology / Digital identity / Authentication / Liberty Alliance / Security Assertion Markup Language / Identity theft / Identity / Identity assurance / Electronic authentication

Microsoft PowerPoint - greenwood-OECD-Norway-07-MAY-07.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2016-03-29 12:11:08
UPDATE