![Computer security / Digital credential / Authentication / Two-factor authentication / Access control / Security Assertion Markup Language / Credential / Digital identity / Federated identity management / Identity management / Security / Identity Computer security / Digital credential / Authentication / Two-factor authentication / Access control / Security Assertion Markup Language / Credential / Digital identity / Federated identity management / Identity management / Security / Identity](https://www.pdfsearch.io/img/01a7a96d1e98d77771e92d3e3642e7d8.jpg)
| Document Date: 2004-04-19 19:05:53 Open Document File Size: 1,79 MBShare Result on Facebook
Company Mastercard / Liberty Alliance / Microsoft / / / Event Reorganization / / IndustryTerm information-sharing applications / authentication technologies / public network / tamper-resistant device / handheld device / federated identity management / privacyinvasive technologies / cross-domain access management / online revocation status checking / cross-domain identity management / certificate infrastructure / on-line chat / application software / intrusion detection systems / digital identity management / basic protocols / security services / managed security services / business to business / multi-application devices / cryptographic co-processor / disparate systems / tamper-resistant devices / roaming access by other devices / smartcard chip / on-line services / information security products / computing / tamperresistant device / security tools / user device / cryptographic authentication technology / vulnerability assessment tools / / Organization Credential Authority / European Union / Attribute Authority / Stefan Brands McGill School of Computer Science & Credentica / OECD / / Person Stefan Brands / Alice / / Position Manager in order / driver / Database Manager / / Technology authentication technologies / seven basic protocols / cellular telephone / cryptography / public key / 8-bit smartcard chip / cryptographic authentication technology / cryptographic co-processor / PKI / Attribute Disclosure protocol / cloning / Attribute Status Verification protocol / secret key / digital signature / anti-virus software / CMP / /
SocialTag |