
1) Assay-mark 2) Computer access control 3) Hallmark 4) Mark 5) Marker 6) Marking
Found on
https://www.crosswordclues.com/clue/authentication

1) Confirmation 2) Corroboration 3) Evidence 4) Seal 5) Statement
Found on
https://www.crosswordclues.com/clue/authentication

Authentication (from αὐθεντικός; real or genuine, from αὐθέντης authentes; author) is the act of confirming the truth of an attribute of a single piece of data (datum) or entity. In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing`s ident....
Found on
http://en.wikipedia.org/wiki/Authentication
[law] Authentication, in the law of evidence, is the process by which documentary evidence and other physical evidence is proven to be genuine, and not a forgery. Generally, authentication can be shown in one of two ways. First, a witness can testify as to the chain of custody through which the evidence passed from the time of the discovery...
Found on
http://en.wikipedia.org/wiki/Authentication_(law)

(from the article `Rembrandt Research Project (RRP)`) ...that were thought to have harmed the image of Rembrandt as a painter. Over time, the project`s aims broadened, as it became clear that much ...
Found on
http://www.britannica.com/eb/a-z/a/127

The process of verifying the identity and legitimacy of a person, object or system.
Found on
http://www.chipandpin.co.uk/info/glossary.html

In the context of bonds, refers to the validation of a bond certificate.
Found on
http://www.duke.edu/~charvey/Classes/wpg/bfglosa.htm

Determination by a numismatic expert as to the status of a coin being original and genuine - not counterfeit.
Found on
http://www.encyclo.co.uk/local/10142

Authoritative determination of the genuineness of a numismatic item.
Found on
http://www.encyclo.co.uk/local/10143

(In topic `Security`) This is simply the process of identifying an individual : it ensures that the individual is who they claim to be and unlike authorisation says nothing about their access rights.
Found on
http://www.encyclo.co.uk/local/20477

Method of ensuring that the person accessing a computer system is who they claim to be.
Found on
http://www.encyclo.co.uk/local/20829

In the context of bonds, refers to the validation of a bond certificate.
Found on
http://www.encyclo.co.uk/local/22402

Technical standards through which ISPs and other mail gateway administrators can establish the true identity of an email sender.
Found on
http://www.encyclo.co.uk/local/22663

The procedure (essentially approval) used by the approval authority in verifying that specification content is acceptable. Authentication does not imply acceptance or responsibility for the specified item to perform successfully.
Found on
http://www.encyclo.co.uk/visitor-contributions.php

The process of establishing the legitimacy of a node or user before allowing access to requested information. During the process, the user enters a name or account number (identification) and password (authentication).
Found on
http://www.encyclo.co.uk/visitor-contributions.php

Authentication is part of a logging on procedure, to establish that the user is who they say they are and that they have a right to use the system.
Found on
http://www.encyclo.co.uk/visitor-contributions.php

The process of establishing the identity of a communicating party. Typical example is a GSM mobile phone which communicates with the network at registration time to establish its identity using A3 algorithm. More precisely this is `peer entity authentication` because the two parties involved are the same levels in the protocol stack and are hence, peers. GSM and other mobile networks have a dedicated AuC (Authentication Centre). Also applied to personal authentication including techniques such as password, PIN or biometric - typically used in m-commerce and e-commerce where a digital signature establishes identity and where non-repudiation may also be required. Authentication is related to encryption and the whole area is dealt with as AAA (Authentication, Authorisation and Accounting) in the Internet world.
...
Found on
http://www.encyclo.co.uk/visitor-contributions.php

Security term, which refers to the process of verifying the identity of another person or system.
Found on
http://www.ft.com/dbglossary

An attestation made by a proper officer, by which he certifies that a record is in due form of law, and that the person who certifies it is the officer appointed by law to do so.
Found on
http://www.lectlaw.com/def/a223.htm

The process of identifying a person or a device prior to allowing communication or conferring access rights to network resources. Authentication should ensure that an individual is who they claim to be.
Found on
http://www.lever.co.uk/wlan-glossary.html

Verification that an item is from an approved source and/or that it is able to meet its declared specification.
Found on
http://www.mpoweruk.com/glossary.htm

The process of determining whether someone or something is who or what it is declared to be. In private and public computer networks (including the Internet), authentication is commonly done through the use of logon passwords.
Found on
http://www.stormwebsitedesign.com/aberdeen_web_design_web_glossary.php

[
n] - a mark on an article of trade to indicate its origin and authenticity 2. [n] - validating the authenticity of something or someone
Found on
http://www.webdictionary.co.uk/definition.php?query=authentication
noun validating the authenticity of something or someone
Found on
https://www.encyclo.co.uk/local/20974

validating the authenticity of something or someone
Found on
https://www.vocabulary.com/lists/310886
No exact match found.