Email authentication

Results: 687



#Item
111Computing / Technology / Password / Email / Internet

ECAS Registration Guide 2014 Call Introduction You must register your organisation on the European Commission Authentication Service (ECAS) first in order to be able to apply for Erasmus+ funding.

Add to Reading List

Source URL: www.ycni.org

Language: English - Date: 2015-02-24 05:58:49
112Computer-mediated communication / MIME / Push email / Email authentication / Email / Computing / Internet

Trusted Mail System™ Enabling the secure, multilevel, policy-enforced exchange of email and attachments from a single inbox.

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:34
113Computer security / Email authentication / Public-key cryptography / Encryption / Secure communication / Tor / Cipher / Symmetric-key algorithm / Email encryption / Cryptography / Internet privacy / Cryptographic software

ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
114OSI protocols / Extended SMTP / Simple Mail Transfer Protocol / MIME / Bounce address / SMTP Authentication / John Klensin / Local Mail Transfer Protocol / Email / Computer-mediated communication / Computing

Network Working Group Request For Comments: 1869 STD: 10 Obsoletes: 1651 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:18:34
115Internet / Email / Email authentication / Sender Policy Framework / Anti-spam techniques / Whitelist / Email spam / Spam / Mark Delany / Spamming / Computing / Spam filtering

Sender Reputation in a Large Webmail Service Bradley Taylor Google IncAmphitheatre Parkway Mountain View, CA 94043

Add to Reading List

Source URL: ceas.cc

Language: English - Date: 2009-11-09 01:27:17
116Internet privacy / Public-key cryptography / Email authentication / Internet standards / PGP / Password / Pretty Good Privacy / Email / Transport Layer Security / Cryptography / Internet / Computing

Using Formstack to Safely Capture More Responses in Higher Education Efficiency & Security

Add to Reading List

Source URL: www.formstack.com

Language: English - Date: 2015-05-08 10:40:00
117Spamming / Internet / Gmail / Message transfer agent / Anti-spam techniques / Email authentication / Email / Computer-mediated communication / Computing

Trend Micro Incorporated reserves the right to make changes to this document and to Hosted Email Security described herein without notice. Before installing and using Hosted Email Security, please review the readme fil

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2013-09-10 04:21:37
118Two-factor authentication / Usability / Authentication / Security token / Likert scale / Password / Email / Multi-factor authentication / One-time password / Security / Access control / Technology

Microsoft Word - Poster abstaract - Balancing usability and security in the business cloud authentication V3.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
119Electronic documents / Email / Internet standards / Computer security / Data security / Electronic voting / National Institute of Standards and Technology / Portable Document Format / Authentication / Computing / Internet / Security

P UBLIC C OMMENT ON : NIST-IR 7682: I NFORMATION S YSTEM S ECURITY B EST P RACTICES FOR UOCAVA-S UPPORTING S YSTEMS ; NIST-IR 7711: S ECURITY B EST P RACTICES FOR THE E LECTRONIC T RANSMISSION OF UOCAVA

Add to Reading List

Source URL: accurate-voting.org

Language: English - Date: 2013-06-05 15:32:08
120Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

Bankston_short_biographical_summary

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-04-27 15:58:07
UPDATE