Key authentication

Results: 993



#Item
331Public key certificate / Certificate authority / HTTP Secure / Root certificate / Common Access Card / Cryptography / Public-key cryptography / Key management

Cross Certificate Chaining Problem – CAC Users NOAA users employ CAC cards (issued by DOD) to access sites requiring Two Factor Authentication (2FA). Occasionally, Microsoft Windows Operating System (WinTel) users cann

Add to Reading List

Source URL: www.corporateservices.noaa.gov

Language: English - Date: 2015-03-03 16:36:23
332Symmetric-key algorithm / Key size / Key / Payment Card Industry Data Security Standard / EMV / ISO / Cryptography / Key management / Derived unique key per transaction

Visa Best Practices for Data Field Encryption, Version 1.0 Point of Sale to Acquirer Domain Security Goals 1. Limit cleartext availability of cardholder data and sensitive authentication data to the point of encryption a

Add to Reading List

Source URL: www.visa-asia.com

Language: English - Date: 2013-09-06 08:42:22
333Email authentication / PGP / Cryptographic software / Key server / S/MIME / GNU Privacy Guard / Email / Public key certificate / IBM Lotus Notes / Cryptography / Key management / Public-key cryptography

Microsoft Word - CompanyCRYPT_News_14_EN.doc

Add to Reading List

Source URL: www.companycrypt.com

Language: English - Date: 2010-08-30 06:04:25
334One-time password / Password / Keystroke logging / Two-factor authentication / Salt / Transaction authentication number / Malware / Key derivation function / Password cracking / Security / Computer security / Cryptography

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
335Genealogy / Undertaking / Authentication / Public key certificate / Form / Bren light machine gun / Cheque / Cryptography / Security / Death certificate

THIS FORM IS NOT FOR SALE Republic of the Philippines National Statistics Office OFFICE OF THE CIVIL REGISTRAR GENERAL APPLICATION FORM - DEATH CERTIFICATE

Add to Reading List

Source URL: www.ecensus.com.ph

Language: English - Date: 2011-09-29 00:22:54
336Identification / Access control / Fingerprint recognition / Fingerprint / BioAPI / Public key fingerprint / Hand geometry / Authentication / Fingerprint Verification Competition / Security / Biometrics / Fingerprints

SecuGen® USB Fingerprint Reader User Guide Installation, Usage, Care and Troubleshooting SG1-0007B[removed]) © Copyright[removed]SecuGen Corporation.

Add to Reading List

Source URL: www.secugen.com

Language: English - Date: 2014-01-28 20:13:32
337Email authentication / Internet privacy / Public-key cryptography / Email / PGP / Email encryption / S/MIME / Outlook Express / Pretty Good Privacy / Cryptography / Computing / Computer security

Why Johnny Still Can’t Encrypt: Evaluating the Usability of Email Encryption Software Steve Sheng Levi Broderick

Add to Reading List

Source URL: www.chariotsfire.com

Language: English - Date: 2014-01-01 11:16:56
338Notary / Escrow / Digital signature / Key escrow / Authentication / Cryptography / Key management / Public-key cryptography

CS255 Programming Project: The Authenticator The project focuses on Anonymous Authentication. Our objective is to enable a person to authenticate himself to a service without revealing his identity. For example, the Wal

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-20 01:28:17
339Cryptography standards / Security token / Safenet / Two-factor authentication / PKCS / Authentication / Smart card / Password / Rainbow Technologies / Cryptography / Security / Public-key cryptography

SafeNet iKey® 2032 PRODUCT BRIEF Benefits • Protects access to data • and sensitive applications

Add to Reading List

Source URL: www.authguard.com

Language: English - Date: 2011-12-09 12:25:16
340Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
UPDATE