Key authentication

Results: 993



#Item
651Public key certificate / Revocation list / Certificate authority / Public key infrastructure / Authentication / Electronic authentication / Cryptography / Public-key cryptography / Key management

Certification Practice Statement for the Board of Governors of the Federal Reserve System

Add to Reading List

Source URL: www.federalreserve.gov

Language: English - Date: 2012-11-09 11:31:46
652Computer security / Identity management / Security Assertion Markup Language / OpenID / Credential Service Provider / Authentication / Identity assurance / Security and safety features new to Windows Vista / Federated identity / Security / Identity

POWERING THE WORLD’S LEADING IDENTITY ECOSYSTEMS Key Benefits 4 S  eamlessly

Add to Reading List

Source URL: securekey.com

Language: English - Date: 2014-08-08 14:42:20
653Security / Credential / Authentication / Federated identity management / Automated teller machine / Public key certificate / Limited liability partnership / Smart card / Password / Identity management / Identity / Computer security

EdWild-RGB-Desktop4-1024x768

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2012-05-09 14:24:13
654Notary / Electronic documents / Access control / Authentication / Packaging / Key management / Portable Document Format / Digital signature / Digital Signature and Electronic Authentication Law / Cryptography / Security / Civil law

PKI System Administration

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
655Key management / Cyberwarfare / Public key infrastructure / Identity management / Entrust / Certisign / Two-factor authentication / Security / Public-key cryptography / Computer security

Contacts: Kate Lewis ChosenSecurity, Inc[removed], x109 [removed]

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 19:01:50
656Electronic commerce / Computer network security / Public key infrastructure / Security token / Entrust / Authentication / Certificate authority / Public key certificate / Common Access Card / Cryptography / Key management / Public-key cryptography

For Immediate Release PR Contact: Mary Tobin O’Keeffe & Company[removed]

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 19:01:15
657Identification / Access control / Computer security / Public key fingerprint / Authentication / Password / Security / Fingerprints / Biometrics

Bi -Start Biometric System by Bio-Start System The fingerprint reading Bio-Start System is designed to prevent unauthorized users from

Add to Reading List

Source URL: www.cram-a-lot.com

Language: English - Date: 2014-02-19 10:07:24
658PGP / Internet privacy / Email authentication / Pretty Good Privacy / Key server / Web of trust / Email encryption / Usability / Key / Cryptography / Public-key cryptography / Key management

Usability of Security: A Case Study Alma Whitten and J. D. Tygar December 18, 1998 CMU-CS[removed]Alma Whitten

Add to Reading List

Source URL: reports-archive.adm.cs.cmu.edu

Language: English - Date: 1998-12-21 10:01:01
659Access control / Identity management / Web services / Enterprise application integration / Service-oriented architecture / Public key infrastructure / Authentication / Business-to-business / XKMS / Cryptography / Computing / Security

White Paper ________________________ XML Trust Services

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2000-11-30 21:53:00
660Hashing / SHA-2 / HMAC / Pseudorandom number generator / Computing / Message authentication codes / Key derivation function / Key management

The Key Agreement Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-23 12:28:29
UPDATE