Electronic authentication

Results: 903



#Item
541Credit / Finance / Personal finance / Payment systems / Equifax / Credit history / Authentication / Online shopping / Point of sale / Financial economics / Electronic commerce / Business

EFS-815-ADV (eIDcasestudy):Layout 1.qxd

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2013-02-05 15:52:16
542Civil law / Electronic commerce / Public key certificate / Authentication / Trademark / Security / Public-key cryptography / Key management

Understanding the Registration Process ACES Business Representative Certificate Copyright ©2006 IdenTrust, Inc. All Rights Reserved. IDENTRUST and the IDENTRUST logo are trademarks and service marks of IdenTrust, Inc.

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
543Anakam / Two-factor authentication / Authentication / Multi-factor authentication / HOTP / Identity management / Transaction authentication number / Security token / SecurID / Security / Computer security / Cryptography

Progressive Authentication­­ — OATH Token Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS),

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
544Identity / Health policy / Identity management / Electronic health record / Authentication / Health information management / Department of Health / Provincial Health Services Authority / Public health / Health / Medicine / Health informatics

Tactical Plan for Health Information Management in British Columbia: Key Projects – [removed]

Add to Reading List

Source URL: www.health.gov.bc.ca

Language: English - Date: 2014-03-05 12:23:21
545Identity management / Federated identity / Identity / Identity assurance / Medical ethics / Key management / E-Authentication / Authentication / Electronic authentication / Cryptography / Security / Computer security

Patient Identity in Directed Exchange: How Much Assurance?

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-07-25 16:36:36
546Security / Identity assurance / National Strategy for Trusted Identities in Cyberspace / Health Insurance Portability and Accountability Act / Authentication / Nationwide Health Information Network / Electronic authentication / Identity management / Computer security / Identity

HIT Privacy and Security Team Recommendations - Transmittal[removed]

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:18:12
547Identity / Electronic commerce / Public key infrastructure / X.509 / Identity management / Digital identity / Public key certificate / Authentication / WISeKey / Cryptography / Public-key cryptography / Key management

Non-Intrusive Identity Management Dr. Stefan Brands McGill School of Computer Science & Credentica April 12, 2004 Presented to: 3rd Annual PKI R&D Workshop, Gaithersburg

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-04-19 19:10:59
548Electronic commerce / Security token / Man-in-the-browser / Entrust / Mobile banking / Identity management / Authentication / Smart card / Two-factor authentication / Security / Computer security / Computing

Entrust IdentityGuard Mobile Mobile Solutions for Greater Authentication Security As mobile devices continue to expand in capability and popularity, they present tremendous opportunities for consumers and enterprises ali

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:47:54
549Computing / Technology / Electronic engineering / Lantronix / Wireless security / IEEE 802.11 / Protected Extensible Authentication Protocol / IEEE 802.1X / Wireless LAN / Computer network security / Wireless networking / Wi-Fi

PremierWave EN Embedded Linux Wireless Medical Server SystemDevice

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-07-11 20:03:00
550Notary / Electronic documents / Computer network security / Microsoft SharePoint / Two-factor authentication / Entrust / Microsoft Office / Authentication / Digital rights management / Cryptography / Security / Software

[removed] – RSA San Francisco – Avoco Secure Introduces Solutions that Combine HighAssurance Digital Credentials from IdenTrust and Avoco’s secure2 Product Line. These Solutions and a New Release of secure2trust,

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 19:01:15
UPDATE