Key authentication

Results: 993



#Item
621Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
622Passphrase / Public key certificate / Password / Authentication / Cryptography / Public-key cryptography / Key management

Understanding the Registration Process ACES Unaffiliated Individual Certificate Copyright ©2006 IdenTrust, Inc. All Rights Reserved. IDENTRUST and the IDENTRUST logo are trademarks and service marks of IdenTrust, Inc.

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:48
623Internet protocols / Domain name system / Cryptographic protocols / Domain Name System Security Extensions / X.509 / Verisign / Extended Validation Certificate / HTTP Secure / Cryptography / Key management / Public-key cryptography

DANE: TLS Domain Name Authentication using the DNS Itself

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-09 14:55:24
624BIOS / Unified Extensible Firmware Interface / Two-factor authentication / Security token / Windows 8 / Smart card / Hardware security module / Cryptography / Computing / Public-key cryptography

presented by Building Secure Firmware with HardwareSecurityModules(HSM) UEFI Summerfest – July 15-19, 2013 Presented by Vishal manan (Microsoft Inc.)

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-23 20:07:58
625Civil law / Electronic commerce / Public key certificate / Authentication / Trademark / Security / Public-key cryptography / Key management

Understanding the Registration Process ACES Business Representative Certificate Copyright ©2006 IdenTrust, Inc. All Rights Reserved. IDENTRUST and the IDENTRUST logo are trademarks and service marks of IdenTrust, Inc.

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
626Anakam / Two-factor authentication / Authentication / Multi-factor authentication / HOTP / Identity management / Transaction authentication number / Security token / SecurID / Security / Computer security / Cryptography

Progressive Authentication­­ — OATH Token Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS),

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
627Identity / Health policy / Identity management / Electronic health record / Authentication / Health information management / Department of Health / Provincial Health Services Authority / Public health / Health / Medicine / Health informatics

Tactical Plan for Health Information Management in British Columbia: Key Projects – [removed]

Add to Reading List

Source URL: www.health.gov.bc.ca

Language: English - Date: 2014-03-05 12:23:21
628Identity management / Federated identity / Identity / Identity assurance / Medical ethics / Key management / E-Authentication / Authentication / Electronic authentication / Cryptography / Security / Computer security

Patient Identity in Directed Exchange: How Much Assurance?

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-07-25 16:36:36
629Cryptographic protocols / Computer network security / Wireless networking / Simple public key infrastructure / Extensible Authentication Protocol / IEEE 802.1X / Transport Layer Security / Authorization certificate / Wireless security / Cryptography / Public-key cryptography / Key management

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗ Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science/Dartmouth PKI Lab† Dartmo

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:11:37
630Identification / Fingerprint / Fingers / Human anatomy / Access control / Received signal strength indication / Two-factor authentication / Public key fingerprint / Security / Fingerprints / Biometrics

˜ 2011 INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN), 21-23 SEPTEMBER 2011, GUIMARAES, PORTUGAL Mol´e: a Scalable, User-Generated WiFi Positioning Engine

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2011-09-19 14:31:26
UPDATE