Key authentication

Results: 993



#Item
221Security / Cyberwarfare / Password / One-time password / Transaction authentication number / Public key certificate / Online banking / Interactive voice response / NemID / Key management / Public-key cryptography / Computer security

Generelle vilkår for certifikatindehavere

Add to Reading List

Source URL: www.danskebank.dk

Language: English - Date: 2012-03-31 18:05:05
222Cryptography / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Integrated Windows Authentication / NTLM / Ticket / Authentication server / Computer network security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
223Key management / Access control / Public-key cryptography / Identity management / Authorization / Authentication / XACML / X.509 / Trust management / Cryptography / Security / Computer security

Authorization in Trust Management: Features and Foundations PETER C. CHAPIN, CHRISTIAN SKALKA, and X. SEAN WANG University of Vermont Trust management systems are frameworks for authorization in modern distributed system

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2013-05-09 09:08:56
224Computer security / Cyberwarfare / Password / One-time password / Transaction authentication number / Public key certificate / Online banking / Interactive voice response / Revocation list / Public-key cryptography / Key management / Security

NemID conditions for online banking and public digital signatures, v.5 1 Introduction NemID is a security solution that you can use for accessing your online banking service, public authority websites and private websit

Add to Reading List

Source URL: www.nemid.nu

Language: English - Date: 2015-04-10 09:51:57
225Computer security / Email authentication / Public-key cryptography / Encryption / Secure communication / Tor / Cipher / Symmetric-key algorithm / Email encryption / Cryptography / Internet privacy / Cryptographic software

ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression February 10, 2015 The American Civil Liberties Union thanks the Special Rapporteur on the Promot

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
226Revocation list / Public key infrastructure / Certificate policy / X.509 / Public key certificate / Certificate authority / Health informatics / Cryptography / Public-key cryptography / Key management

The Healthcare Identifiers Service Document Author National Authentication Service for Health (NASH) , Australian Government Department of Human Services Document Date

Add to Reading List

Source URL: www.humanservices.gov.au

Language: English - Date: 2015-03-24 19:55:03
227HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
228Notary / Electronic commerce / Public key certificate / Electronic signature / Digital signature / SecurID / Password / Authentication / Cryptography / Public-key cryptography / Key management

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00
229Biometrics / Fingers / Human anatomy / Identification / Public key fingerprint / Authentication / Fingerprints / Security / Cryptography

PDF Document

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-24 12:13:22
230Key management / Passphrase / Password / Two-factor authentication / Key / Randomness / Computer network security / Diceware / Password policy / Cryptography / Security / Computer security

OUCH! | April, 2015 IN THIS ISSUE... • Passphrases • Using Passphrases Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-03-31 16:53:29
UPDATE