Electronic authentication

Results: 903



#Item
61Cryptography / Security / Law / Privacy / Data security / Medical law / Medical privacy / Personally identifiable information / Health Insurance Portability and Accountability Act / Confidentiality / Authentication

Memorandum of Understanding to Establish a Secure Electronic Data Collection System Parties to This Memorandum of Understanding This Memorandum of Understanding is entered into this first day of July, 2016 by and between

Add to Reading List

Source URL: ofcy.org

Language: English - Date: 2016-05-13 15:26:26
62Computer access control / Economy / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Direct debit / Smart card / Electronic authentication

Business Conditions for Remote Communication (StandScope of services (1) The account/securities account holder may execute banking transactions by means of Remote Communication within the scope offered by

Add to Reading List

Source URL: www.corporates.commerzbank.com

Language: English - Date: 2015-03-03 06:21:28
63Cryptography / Signature / Records management technology / Computer law / E-commerce / Key management / Electronic signature / Digital signature / Records management / Public key certificate / Authentication / Uniform Electronic Transactions Act

ISSN035X THE UNITED REPUBLIC OF TANZANIA BILL SUPPLEMENT 20th February, 2015

Add to Reading List

Source URL: parliament.go.tz

Language: English - Date: 2015-11-09 09:07:10
64Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-02-10 08:34:16
65Identity management / Federated identity / Privacy / Computer access control / Electronic authentication / Public administration / Privacy Impact Assessment / Information privacy / Internet privacy / Authentication / Medical privacy / Privacy-enhancing technologies

Microsoft Word 310442DB - BusApp - IVS PIA from John Edwards FINAL.DOC

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:45:18
66Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

Public Comments Received on NIST SP: Electronic Authentication Guideline

Add to Reading List

Source URL: csrc.nist.gov

Language: English
67Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:42:08
68Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:10
69Cryptography / Computer security / Computing / Computer access control / Federated identity / Access control / Computer network security / Electronic authentication / Identity management / Authentication / OpenSSH / Application security

Adaptive Defenses for Commodity Software through Virtual Application Partitioning

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2012-10-05 00:01:36
70Access control / Identifiers / Identity management / Computer access control / Automatic identification and data capture / EPCglobal / Authentication / Radio-frequency identification / Track and trace / Digital identity / Business process modeling / Electronic Product Code

Microsoft Word - epedigree_with_dual_ownership_ubisafe_ai_final.doc

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:08:29
UPDATE