Electronic authentication

Results: 903



#Item
891Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2012-02-06 15:11:29
892Computer-mediated communication / Electronic documents / Public-key cryptography / S/MIME / Web of trust / Digital signature / Email authentication / Cryptography / Email / Computing

Microsoft PowerPoint - Using Secure Email.ppt

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2010-08-16 10:07:56
893Electronic commerce / EMV / Chip Authentication Program / Chip and PIN / Debit card / Smart card / Credit card / Automated teller machine / Personal identification number / Payment systems / Technology / Business

Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Saar Drimer and Steven J. Murdoch

Add to Reading List

Source URL: www.saardrimer.com

Language: English - Date: 2011-10-11 10:47:10
894Electronic signature / Computer law / Notice of electronic filing / Digital signature / Electronic commerce / Electronic Signatures in Global and National Commerce Act / Posting rule / Digital Signature and Electronic Authentication Law / Cryptography / Law / Legal documents

PDF Document

Add to Reading List

Source URL: unpan1.un.org

Language: English - Date: 2013-01-25 12:51:31
895Information / Science / Data / Authenticity in art / Preservation / Diplomatics / Authentication / Notice of electronic filing / Authenticity / Aesthetics / Archival science / Public records

PDF Document

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:39:08
896Security / Liberty Alliance / Kantara Initiative / Electronic authentication / Accreditation / Credential / Authentication / NeuStar / Identity management / Identity / Identity assurance

PDF Document

Add to Reading List

Source URL: www.projectliberty.org

Language: English - Date: 2010-06-02 13:18:12
897Secure communication / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / Man-in-the-middle attack / Two-factor authentication / Password / Computing / Internet / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: www.inf.ethz.ch

Language: English - Date: 2007-03-09 10:46:56
898Merchant services / Credit cards / 3-D Secure / Credit card fraud / Chip Authentication Program / Chip and PIN / EMV / Card security code / Secure Electronic Transaction / Electronic commerce / Payment systems / Business

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-01-26 04:40:24
899Public key infrastructure / Certificate authority / Public key certificate / Revocation list / Authentication / Digital signature / Identity management / Smart card / Electronic signature / Cryptography / Key management / Public-key cryptography

PDF Document

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2010-10-20 05:31:46
900Identity management / Electronic authentication / Two-factor authentication / Federated identity / Security token / Authentication / Access token / Information security / One-time password / Security / Cryptography / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 14:43:17
UPDATE