Electronic authentication

Results: 903



#Item
431Electronic commerce / Computer security / Computer network security / Entrust / Security token / Public key infrastructure / Certificate authority / Public key certificate / Mutual authentication / Cryptography / Public-key cryptography / Key management

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2014-09-15 11:56:57
432Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
433Public-key cryptography / Electronic signature / Authentication / Digital signature / Signature / Security token / Two-factor authentication / Cryptography / Security / Notary

[removed]DEPARTMENT OF THE SECRETARY OF STATE Chapter 950: RULES GOVERNING THE USE OF DIGITAL SIGNATURES

Add to Reading List

Source URL: maine.gov

Language: English - Date: 2014-09-19 09:56:17
434Email authentication / Electronic documents / S/MIME / GlobalSign / Email / Public key certificate / Certificate authority / Digital signature / Two-factor authentication / Cryptography / Public-key cryptography / Key management

PersonalSign Digital IDs Authenticate to online services and add trust to your documents and messages. What is a PersonalSign Certificate? Microsoft Office Document Signing

Add to Reading List

Source URL: www.globalsign.com

Language: English - Date: 2013-10-01 11:48:24
435Public-key cryptography / Electronic signature / Authentication / Digital signature / Signature / Security token / Two-factor authentication / Cryptography / Security / Notary

[removed]DEPARTMENT OF THE SECRETARY OF STATE Chapter 950: RULES GOVERNING THE USE OF DIGITAL SIGNATURES

Add to Reading List

Source URL: www.state.me.us

Language: English - Date: 2014-09-19 09:56:17
436Electronic commerce / Computer network security / Hacking / National security / Password / Two-factor authentication / Vulnerability / Network vulnerability scan / SecurityMetrics / Security / Computer security / Cyberwarfare

1 5 Perform External Network Vulnerability Scans at least

Add to Reading List

Source URL: 6d9d8ee3b24b98ab01c7-9b36caa56c1219a43771b85c9c534202.r82.cf2.rackcdn.com

Language: English - Date: 2014-09-29 20:48:55
437Access control / Two-factor authentication / Security token / Electronic authentication / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

DOC Document

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-10-03 16:02:08
438Crime prevention / National security / Electronic commerce / Entrust / Access control / Authorization / Authentication / Smart card / Tamper resistance / Security / Computer network security / Computer security

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-10-01 17:30:35
439Information science / Electronic publishing / Google Books / Shibboleth / Digital preservation / Authentication / E-book / Digital libraries / Library science / HathiTrust

University of Calgary HathiTrust Membership HathiTrust Digital Library is a digital preservation repository for books. HathiTrust currently houses over 11 million volumes including almost 6 million book titles. The origi

Add to Reading List

Source URL: library.ucalgary.ca

Language: English - Date: 2014-06-12 17:12:08
UPDATE