Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
t
- Trustworthiness Assessment Description: Trustworthiness assessment in the context of explainable artificial intelligence (XAI) refers to the process of analyzing and(...) Read more
- Trust Anchor Repository Description: A Trust Anchor Repository is a fundamental storage location within a Public Key Infrastructure (PKI) that houses trust anchors,(...) Read more
- Trust List Description: A 'Trust List' in the context of Public Key Infrastructure (PKI) refers to a set of entities or certificates that are considered(...) Read more
- Trusted Device Description: A trusted device is an essential component in the realm of multifactor authentication, designed to facilitate secure access to(...) Read more
- Transaction Authentication Description: Transaction authentication is a crucial method for verifying a user's identity during a financial operation or sensitive data(...) Read more
- Third-Party Authentication Description: Third-party authentication is an identity verification process that uses an external service to validate a user's identity. This(...) Read more
- Two-Step Verification Description: Two-step verification is a security process that requires two separate forms of identification to access an account or system. This(...) Read more
- Telecom Authentication Description: Telecommunications authentication refers to the methods used to verify the identity of users accessing telecommunications services.(...) Read more
- Transaction Signing Description: Transaction signing is a process that uses cryptographic signatures to verify the authenticity of a transaction, often requiring(...) Read more
- Token Expiration Description: Token expiration is the time limit after which a token is no longer valid. In the context of web application security, a token is a(...) Read more
- Two-Factor Token Description: A two-factor token is a device or software used in two-factor authentication (2FA) processes to verify the user's identity. This(...) Read more
- Two-Way Authentication Description: Two-Way Authentication is an authentication process that requires verification from both the user and the system. This approach is(...) Read more
- Traffic Regulation Description: Traffic Regulation involves managing the flow of data packets in a network to ensure optimal performance and security. This process(...) Read more
- Token Lifecycle Description: The token lifecycle refers to the various stages a token goes through from its creation to its eventual retirement from the market.(...) Read more
- Time to Detect Description: Detection Time refers to the interval that elapses from the occurrence of a security incident until it is identified by monitoring(...) Read more