Key authentication

Results: 993



#Item
761Business / 3-D Secure / Payment systems / Credit cards / Authentication / Acquiring bank / Japan Credit Bureau / Public key certificate / Merchant plug-in / Electronic commerce / Merchant services / Cryptography

J/Secureā„¢ MPI Functional Requirements Ver.1.0 January 2008 2008 JCB Co., Ltd. All rights reserved.

Add to Reading List

Source URL: partner.jcbcard.com

Language: English - Date: 2011-07-08 04:06:08
762Public-key cryptography / Electronic documents / Electronic signature / Digital signature / Legal instrument / Public key certificate / Authentication / Signature / Public key infrastructure / Cryptography / Notary / Key management

PDF Document

Add to Reading List

Source URL: skilriki.is

Language: English - Date: 2007-03-14 09:44:40
763Padding / Authenticated encryption / Chosen-ciphertext attack / Block cipher modes of operation / Block cipher / Ciphertext / Symmetric-key algorithm / Transport Layer Security / Message authentication code / Cryptography / Electronic commerce / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-20 04:03:50
764HTTP / Key management / WS-Security / Password / Authentication / HTTP Secure / X.509 / Public key certificate / SAP Logon Ticket / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.dgaiec.min-financas.pt

Language: English - Date: 2014-08-18 22:25:37
765HTTP / Key management / WS-Security / Password / Public key certificate / Authentication / X.509 / HTTP Secure / SAP Logon Ticket / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.dgaiec.min-financas.pt

Language: English - Date: 2014-08-23 10:15:23
766Digital signature / FIPS 201 / RSA / Public key fingerprint / S/MIME / Authentication / Cryptography / Public-key cryptography / PKCS

Technical Specifications for Personal Identity Verification (PIV) Test Cards

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-18 11:04:19
767Computer network security / Computer security / Crime prevention / National security / Secure communication / Authentication / DigiNotar / Password / Secure Shell / Cryptography / Security / Public-key cryptography

Comments template for Preliminary Cybersecurity Framework # Organization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-13 10:34:43
768Key management / Public-key cryptography / Cryptographic protocols / Electronic commerce / Password / Transport Layer Security / HTTP Secure / Two-factor authentication / Phishing / Cryptography / Security / Secure communication

April 10, 2014 To: IT Executives and Security Staff CRITICAL Vulnerability In OpenSSL: HeartBleed The REN-ISAC [1] wants to stimulate immediate action concerning a CRITICAL vulnerability in a pervasive piece of software,

Add to Reading List

Source URL: www.ren-isac.net

Language: English - Date: 2014-04-10 17:07:16
769Public key infrastructure / Certificate policy / Certificate server / Smart card / Two-factor authentication / Certificate authority / XUDA / Certisign / Cryptography / Key management / Public-key cryptography

U. S. Department of Justice Information Technology Strategic Plan Appendix E Public Key Infrastructure

Add to Reading List

Source URL: www.justice.gov

Language: English - Date: 2006-10-23 11:51:01
770Surveillance / Law / Automated fingerprint identification / Integrated Automated Fingerprint Identification System / Fingerprint / Computerized Criminal History / Public key fingerprint / Criminal Justice Information Services / Authentication / Fingerprints / Biometrics / Security

DRAFT Glossary of AFIS Terms Latent Print AFIS Interoperability Working Group DRAFT Glossary of AFIS Terms FOREWORD

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-05-04 14:50:21
UPDATE