Electronic authentication

Results: 903



#Item
401Electronic commerce / Email authentication / Public key certificate / Certificate authority / S/MIME / Digital signature / Man-in-the-middle attack / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / Key management

Enhanced certificate transparency and end-to-end encrypted mail Mark D. Ryan University of Birmingham, UK CloudTomo Ltd.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-16 09:42:59
402Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-08-15 17:18:12
403Cloud standards / Federated identity / Standards organizations / Electronic health record / Authentication / OpenID / OAuth / Identity management / Multi-factor authentication / Security / Computer security / Computing

Transport & Security Standards Workgroup

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-12-23 13:30:57
404Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-08-15 17:27:34
405Electronic engineering / Computer network security / Videotelephony / Mobile device management / Dynamic Host Configuration Protocol / IEEE 802.11 / IEEE 802.1X / Headset / Extensible Authentication Protocol / Wireless networking / Computing / Technology

OpenStage WL 3 / OpenStage WL 3 Plus  WLAN Handset Administration Manual A31003-M2000-M100-3-76A9 Our Quality and Environmental Management Systems are

Add to Reading List

Source URL: wiki.unify.com

Language: English - Date: 2014-04-08 10:29:04
406Electronic authentication / Access token / Authentication / JavaScript / Revocation list / Security / Computing / Identity management

FIDO U2F Implementation Considerations FIDO Alliance Proposed Standard 09 October 2014 This version: http://www.fidoalliance.org/specs/fido­u2f­implementation­considerations­v1.0­ ps­[removed]html

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-12-09 14:43:39
407Identification / Fingerprints / Biometrics / Two-factor authentication / Authentication / Electronic prescribing / Password authentication protocol / Password / Fingerprint recognition / Security / Access control / Cryptography

Caradigm Authentication Solution for EPCS A growing number of federal and state regulations have been enacted to ensure appropriate controls around issuing electronic prescriptions of controlled substances (EPCS). The U.

Add to Reading List

Source URL: www.caradigm.com

Language: English - Date: 1979-12-31 19:00:00
408Electronic commerce / Computer security / Email authentication / Entrust / Certificate authority / Public key certificate / Email encryption / S/MIME / X.509 / Cryptography / Public-key cryptography / Key management

Entrust Secure Email Certificates Proven Certificates for Encryption & Digital Signatures Entrust Secure Email Certificates provide a cost-effective approach for individuals or organizations to encrypt or digitally sign

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:48:32
409Computer security / Computer network security / Crime prevention / Entrust / National security / Security token / Two-factor authentication / Identity management / Mobile device management / Electronic commerce / Technology / Security

Mobile Security Solutions Securing & Leveraging the Mobile Enterprise The proliferation of mobile devices is front and center for virtually all organizations, in both employee and customer communities. Within the enterpr

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:48:20
410Digital signature / Public key certificate / X.509 / Certificate server / Revocation list / Authentication / Certificate authority / Electronic signature / Public key infrastructure / Cryptography / Public-key cryptography / Key management

AuditorePass Order Documents Online Creating a Digitally

Add to Reading List

Source URL: www.auditorepass.com

Language: English - Date: 2009-07-08 14:36:08
UPDATE