Electronic authentication

Results: 903



#Item
81Payment systems / Digital technology / Electronic money / Financial cryptography / Hypertext Transfer Protocol / Error message / Web standards / Technology / Computing / Cryptographic protocols / Electronic commerce

CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

Add to Reading List

Source URL: www.cavirtex.com

Language: English - Date: 2014-10-02 19:03:57
82Computing / Wi-Fi / Electronic engineering / Wireless access points / IEEE 802.1X / Hotspot / Wireless LAN / Protected Extensible Authentication Protocol / IEEE 802.11 / Wireless networking / Computer network security / Technology

Anyfi Networks Carrier Wi-Fi System BASIC SDWN CORE

Add to Reading List

Source URL: www.anyfinetworks.com

Language: English - Date: 2015-06-22 11:17:44
83Federated identity / Electronic commerce / Password / Two-factor authentication / Security token / Gmail / Phishing / Apple ID / Online banking / Security / Computer security / Technology

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2015-03-30 04:16:27
84Identity document / Electronic voting / Subscriber identity module / Authentication / Security token / Electronic voting in Estonia / Finnish identity card / Security / Cryptography / Smart cards

Internet Voting in Estonia Priit Vinkel Advisor Estonian National Electoral

Add to Reading List

Source URL: www.baltic.org

Language: English - Date: 2011-06-09 09:59:43
85Data security / Symantec / Nortel / Information security / ActivIdentity / Verisign / Electronic business / Anakam / Two-factor authentication / Computing / Security / Business

eSecure Systems, LLC Data as of    Business Analysis

Add to Reading List

Source URL: www.equitynet.com

Language: English - Date: 2015-06-24 18:29:03
86

1997 Paper 7 Question 9 Security Describe the following modes of operation of a block cipher: electronic codebook, cipher block chaining, output feedback, cipher feedback, message authentication code and hash function.

Add to Reading List

Source URL: www.cl.cam.ac.uk

- Date: 2014-06-09 10:17:16
    87

    The Electronic Transactions Act, Date of Authentication and Publication 22 Mansirdecember 8, Act number 27 of the year 2063

    Add to Reading List

    Source URL: www.cca.gov.np

    Language: English - Date: 2014-06-01 07:03:53
      88Biometrics / Information technology management / Digital signature / Electronic signature / Signature / Enterprise content management / Authentication / Cryptography / Security / Notary

      LEX_Launch_Content_Highlight_Close_CMYK

      Add to Reading List

      Source URL: www.perceptivesoftware.co.uk

      Language: English - Date: 2015-06-18 15:36:07
      89Payment systems / Electronic commerce / Security token / Two-factor authentication / Software token / Embedded systems / Authentication / Online banking / Debit card / Security / Computer security / Access control

      Application for DBBL Two Factor Authentication (2FA) Registration Date: D D M M

      Add to Reading List

      Source URL: ecom1.dutchbanglabank.com

      Language: English - Date: 2014-03-24 01:38:00
      90Biometrics / Information technology management / Digital signature / Electronic signature / Signature / Enterprise content management / Authentication / Cryptography / Security / Notary

      LEX_Launch_Content_Highlight_Close_CMYK

      Add to Reading List

      Source URL: www.perceptivesoftware.de

      Language: English - Date: 2015-06-17 19:48:46
      UPDATE