Electronic authentication (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Electronic authentication" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
low place
low place
low place
low place
355th place
454th place
2nd place
2nd place
446th place
308th place
68th place
117th place
4,238th place
3,536th place
8,888th place
6,276th place
1,031st place
879th place
11th place
8th place
2,755th place
1,753rd place
low place
low place
low place
low place
low place
low place
low place
low place
7,500th place
4,971st place
1,937th place
7,777th place
2,435th place
1,699th place
low place
low place
1,356th place
870th place
4,378th place
2,689th place
207th place
136th place

agimo.gov.au

archives-ouvertes.fr

hal.archives-ouvertes.fr

archives.gov

obamawhitehouse.archives.gov

cryptomathic.com

doi.org

e-authentication.gov.hk

  • The Office of the Government Chief Information Officer. "What is e-Authentication?". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on 22 December 2015. Retrieved 1 November 2015.
  • Office of the Government Chief Information Officer. "Passwords and PINs based Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on May 31, 2015. Retrieved 2 November 2015.
  • Office of the Government Chief Information Officer. "Public-Key Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on May 31, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "Symmetric-key Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on July 9, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "SMS based Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on August 27, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "Biometric Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on January 8, 2015. Retrieved 3 November 2015.

epramaan.gov.in

europa.eu

ec.europa.eu

eur-lex.europa.eu

finance.gov.au

garant.ru

gcn.com

ic.gc.ca

e-com.ic.gc.ca

japanpkiforum.jp

nist.gov

pages.nist.gov

itl.nist.gov

psu.edu

citeseerx.ist.psu.edu

  • Sawma, Victor. "A New Methodology for Deriving Effective Countermeasures Design Models". School of Information Technology and Engineering, University of Ottawa. CiteSeerX 10.1.1.100.1216. {{cite journal}}: Cite journal requires |journal= (help)

schneier.com

semanticscholar.org

api.semanticscholar.org

techtarget.com

searchsecurity.techtarget.com

thenextweb.com

usdoj.gov

deadiversion.usdoj.gov

warwick.ac.uk

www2.warwick.ac.uk

web.archive.org

  • The Office of the Government Chief Information Officer. "What is e-Authentication?". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on 22 December 2015. Retrieved 1 November 2015.
  • Office of the Government Chief Information Officer. "Passwords and PINs based Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on May 31, 2015. Retrieved 2 November 2015.
  • Office of the Government Chief Information Officer. "Public-Key Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on May 31, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "Symmetric-key Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on July 9, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "SMS based Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on August 27, 2015. Retrieved 3 November 2015.
  • Office of the Government Chief Information Officer. "Biometric Authentication". The Government of the Hong Kong Special Administrative Region of the People's Republic of China. Archived from the original on January 8, 2015. Retrieved 3 November 2015.
  • "E-Authentication Risk Assessment for Electronic Prescriptions for Controlled Substances" (PDF). Archived from the original (PDF) on 27 April 2017. Retrieved 3 November 2015.
  • Radack, Shirley. "ELECTRONIC AUTHENTICATION: GUIDANCE FOR SELECTING SECURE TECHNIQUES". Archived from the original on September 15, 2015. Retrieved 3 November 2015.
  • Radack, Shirley. "ELECTRONIC AUTHENTICATION: GUIDANCE FOR SELECTING SECURE TECHNIQUES". National Institute of Standards and Technology. Archived from the original on September 15, 2015. Retrieved 3 November 2015.
  • McCarthy, Shawn. "E-authentication: What IT managers will be focusing on over the next 18 months". GCN. Archived from the original on 20 December 2014. Retrieved 2 November 2015.
  • An overview of International Initiatives in the field of Electronic Authentication Archived 2011-07-22 at the Wayback Machine, Japan PKI Forum, June 2, 2005.
  • Australia Archived 2012-02-12 at the Wayback Machine, Canada Archived 2008-03-05 at the Wayback Machine, US (M04-04).

wisegeek.com