Key authentication

Results: 993



#Item
171Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

Add to Reading List

Source URL: web.sfc.wide.ad.jp

Language: English - Date: 2006-01-24 03:14:56
172Two-factor authentication / Password / Authentication / Single sign-on / Password manager / Private biometrics / Security / Access control / Biometrics

ID Director for IBM ESSO May 2014.pub

Add to Reading List

Source URL: bio-key.com

Language: English - Date: 2014-05-16 10:53:56
173Public-key cryptography / Electronic signature / Digital signature / Uniform Electronic Transactions Act / Electronic Signatures in Global and National Commerce Act / Signature / Authentication / Public key certificate / PAdES / Cryptography / Notary / Key management

Electronic Signatures Reference Guide For real estate professionals working with short sale, deed in lieu and real estate owned properties March 2013

Add to Reading List

Source URL: agentresources.bankofamerica.com

Language: English - Date: 2013-06-14 21:16:28
174Cryptographic protocols / Electronic commerce / Public key certificate / X.509 / Identity document / Email authentication / Certificate authority / Smart card / Cryptography / Public-key cryptography / Key management

NIC Certifying Authority National Informatics Centre Ministry of Communications & Information Technology Government of India Photo & ID proof to

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2014-12-03 03:37:17
175Authentication / Notary / Packaging / Security / Access control / Identity management

One Identity Trust Framework for all Business and Personal Transactions Establishing a Key Cornerstone for Cyber Security to Achieve Trust

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:59:11
176Key management / Authentication / Digital signature / Non-repudiation / Electronic authentication / Key / Cryptography / Public-key cryptography / Notary

This rule was filed as 1 NMACTITLE 1 CHAPTER 12 PART 7 GENERAL GOVERNMENT

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2009-11-05 18:43:35
177Error detection and correction / Digital signature / RSA / ODB / Hash tree / Cryptography / Public-key cryptography / Key management

Authentication and Integrity in Outsourced Databases Einar Mykletun, Maithili Narasimha, Gene Tsudik Computer Science Department School of Information and Computer Science University of California, Irvine mykletun,mnaras

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:35
178Comodo Group / Public-key cryptography / Authentication / Phishing / Melih Abdulhayoğlu / Comparison of SSL certificates for web servers / Cryptography / Certificate authorities / Key management

Building Trust with Customers Builds Business. Identity and Trust Assurance Technologies. It’s How eCommerce Gets Done. Trust is the currency of the internet. Without it, communication, commerce or collaboration cannot

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2014-02-03 11:07:19
179Integrated Windows Authentication / Revocation list / Authentication / Digital signature / X.509 / Parity of a permutation / Cryptography / Public-key cryptography / Password authentication protocol

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-03-26 16:30:23
180Public key infrastructure / Public key certificate / Certificate authority / Security token / Digital signature / Common Access Card / Authentication / Certificate policy / Revocation list / Cryptography / Public-key cryptography / Key management

DD Form 2842, DoD Public Key Infrastructure Certificate of Acceptance and Acknowledgement of Responsibilities - Subscriber, September 2002

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2012-05-08 13:03:42
UPDATE