Key authentication

Results: 993



#Item
681Code division multiple access / Cryptographic protocols / Mobile technology / AKA / Roaming / Universal Mobile Telecommunications System / IEEE 802.11 / Handover / Extensible Authentication Protocol / Technology / Wireless networking / Wireless

Key Management Challenges in Mobility Applications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:08:30
682Merchant services / Cryptographic protocols / Radio-frequency identification / Verisign / Certificate authority / Authentication / Payment gateway / X.509 / Two-factor authentication / Cryptography / Public-key cryptography / Key management

Knowledge-Based Authentication Challenge Response System Kevin Trilli Director, Product Management VeriSign, Inc. Bill Andrews

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
683Notary / Electronic signature / Computer security / Digital signature / Authentication / Electronic Signatures in Global and National Commerce Act / Signature / Public key certificate / Non-repudiation / Cryptography / Public-key cryptography / Key management

DOC Document

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2013-12-26 11:54:23
684Packaging / Identity management / Electronic commerce / Authentication / Tamper resistance / Electronic authentication / RSA / Biometrics / Credential / Cryptography / Security / Public-key cryptography

Leveraging the Power of Vertical Search Engines

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:33:48
685Computer-mediated communication / S/MIME / Gmail / MIME / Public-key cryptography / Jumbleme / Email authentication / Email / Computing / Internet

PDF Document

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2014-02-10 16:16:59
686Equifax / Financial economics / Credit rating agencies / Credit

Retail Banking DDA Solutions—Account Acquisition Key benefits > Reduce risk by automating your account validation and authentication workflow > Streamline compliance

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2014-02-10 21:43:45
687Key management / Electronic commerce / National security / Authentication / Public key certificate / Public key infrastructure / X.509 / Security service / Computer security / Cryptography / Public-key cryptography / Computer network security

[removed]ACGT_D11.4_Requirements_and_guidelines_for_developing_secured_ACGT_services_v2_5_FINAL_REVISED

Add to Reading List

Source URL: acgt.ercim.eu

Language: English - Date: 2012-03-19 10:49:45
688Comodo Group / Public-key cryptography / Key management / S/MIME / Certificate signing request / Comodo / Two-factor authentication / Revocation list / Password / Cryptography / Certificate authorities / Cryptographic protocols

Comodo Certificate Manager Software Version 4.4 SMIME Enroll API Guide Version[removed]

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2014-04-22 12:15:24
689Internet privacy / Personally identifiable information / Medical privacy / Political privacy / The Transparent Society / P3P / Privacy-enhancing technologies / Privacy / Ethics / Anonymity

How to Balance Privacy and Key Management in User Authentication Anna Lysyanskaya Brown University Privacy vs. Accountability

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:05:58
690Certificate policy / X.509 / Public key certificate / Revocation list / Online Certificate Status Protocol / Certificate authority / Public key infrastructure / Authentication / Data Validation and Certification Server / Cryptography / Public-key cryptography / Key management

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA)

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2013-06-03 14:55:40
UPDATE