Key authentication

Results: 993



#Item
641Two-factor authentication / Anakam / Authentication / Multi-factor authentication / Agnitio / Keystroke dynamics / Security / Access control / Biometrics

Progressive Authentication — Voice Biometrics Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS)

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
642Block ciphers / Advanced Encryption Standard / OCB mode / Authenticated encryption / IAPM / Block cipher / Initialization vector / Block size / CBC-MAC / Cryptography / Block cipher modes of operation / Message authentication codes

Report on the Symmetric Key Block Cipher Modes of Operation Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 11:20:22
643Electronic documents / Cryptographic protocols / Electronic commerce / Key management / Password / Public key certificate / Identity management / Authentication / X.509 / Cryptography / Security / Public-key cryptography

CROMERR System Checklist Item Attachment 1 – SCS Registration Maintenance Rules of Behavior Release.doc Attachment 2 – SCS Sample Electronic Signature Agreement.docx Attachment 3 – Process flow for e-signature and

Add to Reading List

Source URL: www.exchangenetwork.net

Language: English - Date: 2014-03-10 02:45:05
644Computer security / Federated identity / Key management / Public-key cryptography / Security Assertion Markup Language / Liberty Alliance / Authentication / Public key certificate / Identity provider / Cryptography / Identity management / Identity

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-07-14 13:11:10
645Cryptographic software / Advanced Encryption Standard / AES instruction set / Message authentication codes / Galois/Counter Mode / CLMUL instruction set / OpenSSL / Nehalem / Key generation / Cryptography / X86 architecture / X86 instructions

WHITE PAPER AN EVALUATION OF NEW PROCESSOR INSTRUCTIONS FOR ACCELERATING SELECTED CRYPTOGRAPHIC ALGORITHMS

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2011-10-28 14:45:02
646Block cipher / CMAC / CBC-MAC / One-key MAC / Message authentication codes / Cryptography / PMAC

Second Modes of Operation Workshop (August[removed]PMAC: A Parallelizable Message Autentication Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 13:10:47
647Block cipher / Theoretical computer science / Mathematics / Universal hashing / Find first set / One-key MAC / CBC-MAC / Message authentication codes / Cryptography / PMAC

First Modes of Operation Workshop (October[removed]Comments to NIST concerning AES Modes of Operation: PMAC: A Parallelizable Message Authentication Code

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:41:02
648Notary / Public-key cryptography / Electronic signature / Digital signature / Authentication / Signature / Electronic Signatures in Global and National Commerce Act / Non-repudiation / Password / Cryptography / Security / Civil law

ANDREW M. CUOMO GOVERNOR State Capitol P.O. Box 2062 Albany, NY[removed]www.cio.ny.gov

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2013-05-23 20:45:54
649Notary / Identity document / Vehicle registration plate / Public key certificate / Notary public / Cryptography / Security / Identification

PURCHASING A USED VEHICLE In order to purchase a used vehicle you must have the seller’s signature authenticated on the deed of sale and within sixty days of such authentication you must register the change of ownershi

Add to Reading List

Source URL: www.up.aci.it

Language: English - Date: 2011-04-19 03:23:06
650Identity / Two-factor authentication / Phishing / Multi-factor authentication / Public key infrastructure / Authentication / Single sign-on / Online banking / Identity management / Cryptography / Security / Computer security

The missing piece of the security jigsaw Despite spending significant sums on IT security, banks have not fully addressed the issue of identity authentication. Andrea Klein* describes the

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 19:01:15
UPDATE