Electronic authentication

Results: 903



#Item
701Electronic authentication / Access control / Security token / System administration / Cryptography / Password / Single sign-on / Authentication / Kerberos / Security / Computer security / Identity management

TE For intrusion detection and prevention system capabilities, stateful protocol analysis uses which of the following?

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2013-08-26 07:14:46
702Key management / Public-key cryptography / Electronic signature / Digital signature / Authentication / Email / Electronic data interchange / Public key certificate / Electronic Signatures in Global and National Commerce Act / Cryptography / Notary / Electronic documents

Electronic Transactions Law Chapter One Definitions and General Provisions Article (1) In the application of this Law, The following words and expressions shall have the meaning assigned to them, unless the context other

Add to Reading List

Source URL: ita.gov.om

Language: English - Date: 2009-05-11 02:17:10
703Identifiers / Automatic identification and data capture / Standards organizations / Security / Electronic commerce / GS1 / Traceability / Counterfeit medications / Data Matrix / Barcodes / Identification / Technology

Public Policy Fact Sheet Combating counterfeiting through product authentication and traceability ‘Global standards enable anti-counterfeiting technologies’ The situation number of times. Significant inconsistencies

Add to Reading List

Source URL: www.gs1.org

Language: English - Date: 2009-07-16 03:24:59
704Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

2011 IEEE Symposium on Security and Privacy Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET Juliano Rizzo Netifera

Add to Reading List

Source URL: netifera.com

Language: English - Date: 2011-04-20 04:03:50
705Notary / Packaging / Email / Technology / Internet / Security / Access control / Authentication

Companies House Electronic Filing Service Presenter Account Application (To File Non-fee Bearing Documents Only) Please note: Some fields are Mandatory. The form will be returned if these fields are not completed. Please

Add to Reading List

Source URL: companieshouse.gov.uk

Language: English - Date: 2013-11-11 02:42:35
706EMV / Business / Debit card / Two-factor authentication / Online shopping / Smartphone / Technology / Information technology management / Electronic commerce / Payment systems / Embedded systems

2 May, 2013 Q & A from the MPOS paper webinar Questions by journalists and analysts Answers by Matt Calman, chair of MPOS workgroup

Add to Reading List

Source URL: www.mobeyforum.org

Language: English - Date: 2013-08-13 09:58:57
707Transaction authentication number / Online shopping / Business / Information technology management / Technology / Yodlee / Electronic commerce / Bank

SmallBusiness_Finovate_final

Add to Reading List

Source URL: www.yodlee.com

Language: English - Date: 2014-07-01 10:46:09
7083-D Secure / Authentication / Acquiring bank / Japan Credit Bureau / Merchant plug-in / Electronic commerce / Merchant services / Business

J/Secure™ ACS Functional Requirements Ver.1.0 June 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:07
709Public safety / Computer security / Data security / Authentication / Information security / Assurance services / Identity assurance / Two-factor authentication / Security / Crime prevention / National security

A guide for government organisations Assurance levels for authentication for electronic government services (version 2) The Standardisation Forum

Add to Reading List

Source URL: www.forumstandaardisatie.nl

Language: English - Date: 2013-11-19 04:14:24
710Merchant services / Business / Secure communication / 3-D Secure / Payment systems / Authentication / Acquiring bank / Public key certificate / Transport Layer Security / Cryptography / Cryptographic protocols / Electronic commerce

J/Secure™ Protocol Specification Ver.1.0 January 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:09
UPDATE