Key authentication

Results: 993



#Item
611Key management / Electronic documents / Electronic signature / Security token / Authentication / Digital signature / Non-repudiation / Two-factor authentication / Password / Cryptography / Public-key cryptography / Notary

Licensing Division Reengineering Project Requirements Workshop Copyright Owners[removed]

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2011-03-04 13:24:38
612Public-key cryptography / Computer network security / Key management / Federated identity / Single sign-on / Security token / Authentication / One-time password / RADIUS / Cryptography / Computer security / Security

Microsoft Word - NERSCOnlineCA.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2006-02-07 15:54:10
613Law / Credit card / Public key certificate / Apostille convention / Authentication / Certificate of origin / Civil law / Notary / Cryptography

**NEW Certificate of Free Sale Request Form** 2014.D Many countries now require a formal affidavit attesting that the products being imported are of the same quality as those manufactured and “sold freely” in the U.S

Add to Reading List

Source URL: icmad.org

Language: English - Date: 2014-07-02 13:26:23
614X.509 / Security token / Certificate authority / Revocation list / Two-factor authentication / Public key certificate / Hardware security module / Digital signature / PKCS / Cryptography / Public-key cryptography / Key management

Microsoft Word - PKI-07 - OTPK #140 v1_2.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-12 18:49:46
615Cryptographic protocols / Internet privacy / Email authentication / Public key infrastructure / X.509 / Secure messaging / S/MIME / Public key certificate / XKMS / Cryptography / Public-key cryptography / Key management

Improving Message Security With a Self-Assembling PKI Jon Callas Chief Technical and Security Officer 28 April 2003

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 12:04:46
616Access control / Authentication / Notary / Packaging / Authorization / Key management / Security / Computer security / Identity management

Trust Transport Technologies Introduction Krishna Sankar Cisco Systems What is Trust ?

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-30 15:42:22
617Digital signature / X.509 / Certificate policy / Public key certificate / Certificate authority / Two-factor authentication / PKCS / Public key infrastructure / Security and safety features new to Windows Vista / Cryptography / Public-key cryptography / Key management

Digital Signatures Made Simple – A Real World Implementation and Customer Success Stories

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-03-01 08:57:12
618Credit rating agencies / Identity / Access control / Anakam / Equifax / Identity management / Data security / Authentication / Multi-factor authentication / Security / Financial economics / Computer security

Identity and Fraud Solutions Key benefits > Use one platform to integrate with existing applications and manage identity and fraud mitigation

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2013-02-19 11:47:05
619Grid computing / Federated identity / Voms / National Grid Service / Shibboleth / Authorization certificate / Certificate authority / X.509 / Integrated Windows Authentication / Cryptography / Public-key cryptography / Key management

A Scalable PKI for a National Grid Service Jens Jensen, David Spence, Matthew Viljoen Rutherford Appleton Laboratory The National Grid Service for the United Kingdom February, 2007 Abstract

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-12 18:50:39
620Internet protocols / Internet standards / Two-factor authentication / Authentication / Smart card / Public key infrastructure / Online Certificate Status Protocol / Password / SCVP / Cryptography / Public-key cryptography / Cryptographic protocols

Smart Card Alliance Comments: Draft FIPS[removed]Usage: Authentication  LaChelle LeVan  Director, Strategic Alliances - Probaris

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-04-21 01:00:00
UPDATE