Electronic authentication

Results: 903



#Item
71EM For Windows™ Compliance Pack Do You Need Compliance Pack? Compliance Features User authentication Electronic signatures Full audit trail

EM For Windows™ Compliance Pack Do You Need Compliance Pack? Compliance Features User authentication Electronic signatures Full audit trail

Add to Reading List

Source URL: www.lkc.com

Language: English - Date: 2013-12-09 15:54:26
    72White Paper  Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

    White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:43:58
    73RFID Meets the Internet  Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis RFID technology tracks the flow of physical items and goods in supply chains

    RFID Meets the Internet Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis RFID technology tracks the flow of physical items and goods in supply chains

    Add to Reading List

    Source URL: cocoa.ethz.ch

    Language: English - Date: 2013-05-23 01:51:43
    74White Paper  Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

    White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:03
    75

    PDF Document

    Add to Reading List

    Source URL: gnutls.org

    Language: English - Date: 2016-02-03 03:28:21
    76

    PDF Document

    Add to Reading List

    Source URL: opensignature.org

    Language: English - Date: 2013-09-02 12:52:30
    77Public-key cryptography / Electronic commerce / Notary / Electronic signature / Public key certificate / Information security / Digital signature / Authentication / Electronic business / Cryptography / Security / Key management

    DOC Document

    Add to Reading List

    Source URL: www.mg.gov.pl

    Language: English - Date: 2014-07-24 09:08:33
    78CS255: Cryptography and Computer Security  Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

    CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-11 11:47:35
    79Identity management / Identity document / Anonymity / Information privacy / Privacy / Authentication / Personally identifiable information / Electronic signature / Identity theft / Security / Ethics / Cryptography

    DiagramThe identity chain

    Add to Reading List

    Source URL: keteninformatisering.nl

    Language: English - Date: 2007-01-14 14:36:54
    80Online Services – FAQ’s What are the benefits?    

    Online Services – FAQ’s What are the benefits?    

    Add to Reading List

    Source URL: www.kctmo.org.uk

    Language: English - Date: 2013-10-14 06:27:43