Electronic authentication

Results: 903



#Item
41Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
42Computer access control / Identity management / Federated identity / Security / Computer security / Single sign-on / Authentication / Password / Information security / Privacy / Health Insurance Portability and Accountability Act / Electronic authentication

Privacy Implications for Single Sign-on Authentication In a Hospital Environment Rosa R. Heckle Wayne G. Lutters

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
43Computer network security / Computer access control / ESET / Multi-factor authentication / Authentication / OpenVPN / Virtual private network / RADIUS / Password / Internet Authentication Service / Electronic authentication

logotype - ESET Secure Authentication

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-07-29 05:51:23
44Certificate authorities / Computer access control / IdenTrust / Authentication / ING Group / Bank / EBAM

IdenTrust™ Electronic Account Management Streamlining Processes & Reducing Costs for Global Corporations Account Opening and Maintenance Made Easy

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:45
45Signature / Public-key cryptography / Cryptography standards / Computer law / Key management / Public key certificate / Authentication / Digital signature / Electronic signature / Qualified electronic signature / RSA SecurID / FIPS 140-2

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00
46Signature / Public-key cryptography / Notary / Public key infrastructure / Key management / Authentication / RSA SecurID / Public key certificate / Password / EIDAS / Digital signature / Electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-05-17 09:49:57
47Identity management / Computer access control / Federated identity / Electronic identification / Identification / Digital identity / Authentication / Eid / National Strategy for Trusted Identities in Cyberspace / Interoperability / Mobile identity management

Microsoft Word - SSEDIC Memorandum.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English - Date: 2014-06-09 09:30:06
48Online banking / Computer access control / Cryptography / Notary / Barcodes / Electronic Banking Internet Communication Standard / QR code / Digital signature / Transaction authentication number / Authentication / Encryption / Computer security

PPI Sign app Secure login to portals via smartphone Portal login and EBICS signatures via smartphone in accordance with the minimum requirements for the security of internet payments

Add to Reading List

Source URL: www.ppi.de

Language: English - Date: 2015-10-28 10:41:38
49Signature / Cryptography standards / Public-key cryptography / E-commerce / Computer law / Public key certificate / Authentication / Electronic signature / FIPS 140-2 / Digital signature / Qualified electronic signature / RSA SecurID

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-07-09 04:32:36
50Computer access control / Certificate authorities / Public key infrastructure / Public-key cryptography / Transport Layer Security / IdenTrust / Authentication / Know your customer

Electronic Account Mgmt_State Treasurer Article 5.ai

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
UPDATE