Key authentication

Results: 993



#Item
11Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
12Cryptography / Public-key cryptography / Key management / Public key infrastructure / Certificate policy / Public key certificate / Certificate authority / Authentication / Revocation list / X.509 / Certification Practice Statement / Electronic authentication

Digitally signed by JOHN VOLMER (Affiliate) DN: c=US, o=U.S. Government, ou=Department of Energy, =, cn=JOHN VOLMER (Affiliate)

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2009-08-10 19:47:56
13Cryptography / Public-key cryptography / Zero-knowledge proof / ID-based encryption / Cryptographic protocol / ID-based cryptography / Authentication / Digital signature / FeigeFiatShamir identification scheme

Reset Secure Identity-Based Identification Schemes without Pairing Ji-Jian Chin, Hiroaki Anada Syh-Yuan Tan Direction and Motivations  Cryptography: the art and science of concealing

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-23 04:37:54
14Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
15Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
16Cryptography / Computer security / Computer access control / Certificate authorities / Identity management / Public-key cryptography / Federated identity / EBAM / IdenTrust / Authentication / Digital identity / Multi-factor authentication

Accountability – The Key to Expanding Global Commerce p9.ai

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:41
17Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
18Cryptography / Computer access control / Signature / Computer law / E-commerce / Cryptography standards / Authentication / Biometrics / Electronic signature / RSA SecurID / Public key certificate / Qualified electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
19Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
20Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
UPDATE