Authentication protocols

Results: 771



#Item
451Internet / Email authentication / Internet protocols / Domain name system / Cryptographic protocols / DomainKeys Identified Mail / Sender Policy Framework / DMARC / Cross-site request forgery / Computing / Spam filtering / Computer security

.trust Technical Policy The .trust Technical Policy may be updated by NCC Group plc at any time. For any questions or for the most current version, please contact [removed].

Add to Reading List

Source URL: www.nccgroupdomainservices.com

Language: English - Date: 2014-10-14 14:18:55
452HTTP / Man-in-the-middle attack / Password / Authentication / AKA / HTTP cookie / Public-key cryptography / Cryptography / Security / Cryptographic protocols

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:25:36
453Security / Tunneling protocols / Internet privacy / Network architecture / Two-factor authentication / Security token / OpenVPN / Password / Mutual authentication / Computing / Computer network security / Computer security

Duo Security Two-Factor Authentication Made Easy Product Overview Duo Security provides two-factor authentication as a service built to prevent account takeover and online fraud. Protect

Add to Reading List

Source URL: www.duosecurity.com

Language: English - Date: 2013-10-03 17:19:00
454Cryptographic protocols / Public-key cryptography / Key management / Digital credential / Authentication / Public key certificate / Privacy / Electronic health record / Health Insurance Portability and Accountability Act / Cryptography / Electronic commerce / Identity management

November 29, 2010 David Blumenthal, MD, MPP National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W.

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:27:34
455Two-factor authentication / Internet protocols / Security token / Password / Authentication / AKA / Symantec / Anakam / Password manager / Cryptography / Security / Computer security

PARTNER BRIEF: STRONG, SMARTER USER AUTHENTICATION ........................................ Effective, User-Friendly Solution Addresses Security Challenges of Today’s Mobile Business

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-22 07:19:00
456Cryptographic protocols / 3-D Secure / Authentication / Merchant account / Credit card / Password / RADIUS / Merchant plug-in / Electronic commerce / Merchant services / Payment systems

PSiGate For Public Distribution PSi Gate PSiGate 3-D Authentication (PSi3D)

Add to Reading List

Source URL: www.psigate.com

Language: English - Date: 2014-10-09 10:00:36
457Computer security / Cryptographic protocols / Cloud standards / Computer network security / Internet standards / OAuth / Authentication / Kerberos / Security token / Computing / Security / Internet protocols

Authentication for the Web of Things Submission to the W3C Workshop on the Web of Things, 25–26 June 2014, Berlin, Germany Author: Oliver Pfaff, Siemens AG, Corporate Technology, [removed] Introduction A

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-05-10 07:02:30
458Network architecture / Internet protocols / Ajax / JavaScript / JSON / Application programming interface / Hypertext Transfer Protocol / Domain name / Representational state transfer / Computing / Domain name system / Internet

DNS Made Easy REST API Documentation v1.2 Overview Making a request REST requests can be made via HTTPS or HTTP by using the headers, authentication, data types, and methods specified below. The current endpoint for the

Add to Reading List

Source URL: www.dnsmadeeasy.com

Language: English - Date: 2013-10-10 14:17:16
459Security / Cryptographic protocols / OAuth / Secure communication / Internet / Internet standards / SAML-based products and services / Computing / Internet protocols / Cloud standards

The Increasing Importance of Proof-of-Possession to the Web Michael B. Jones [removed] – http://self-issued.info/ August 14, 2014 W3C Workshop on Authentication, Hardware Tokens and Beyond

Add to Reading List

Source URL: self-issued.info

Language: English - Date: 2014-08-14 19:07:50
460Email / Computer-mediated communication / Internet / Cryptographic protocols / DMARC / Yahoo! / DomainKeys Identified Mail / Domain Name System / Example.com / Email authentication / Spam filtering / Computing

M3AAWG DMARC Training Series Mike Adkins, Paul Midgen DMARC.org October 22, 2012 © slide PDF files and videos copyrighted by the

Add to Reading List

Source URL: www.maawg.org

Language: English - Date: 2014-12-06 12:08:43
UPDATE