First, technology that can be used to authenticate digital-media records of human rights abuses is needed.
If Cromwell can authenticate these tales, he can find Anne and her lovers treasonable.
We allow users to authenticate their profiles, via Facebook or Twitter or their mobile phones.
Or if ATMs could authenticate users with facial recognition and immediately begin the transaction?
If you try using a different device, a special procedure kicks in to authenticate you.
FORBES: An European In New York - A Story Of Convenience Versus Security
He cannot use Facebook as a defacto web passport to authenticate his identity on other sites.
FORBES: Related Stories Made One Writer Quit Facebook And Why Many More May Unbundle Soon
Attempts to admit such evidence raise a number of questions, including how to authenticate ESI as admissible.
More important, however, the court provided useful guidance for practitioners who need to authenticate social media-based ESI.
No one worried about a way to authenticate where a message had begun or who had sent it.
Certificate attacks will be with us as long as MD5 based certificates are used to authenticate critical systems.
FORBES: Flame's MD5 collision is the most worrisome security discovery of 2012
Set top boxes for satellite and cable also use a hardware module to authenticate devices and bind them to subscribers.
Today, Cerf lamented, the Internet does little to authenticate either servers, like those that host Web sites, or users themselves.
Cerf would like to strike a balance: he prefers solutions that "strongly authenticate" people when necessary, without eliminating anonymity altogether.
ENGADGET: Vint Cerf: Google services need a degree of anonymity, and they deliver it
In order to successfully discipline players based on the records, witnesses would be needed to authenticate them, the official said.
"Operators have been focusing on how to authenticate the user, and on securing the transfer of information through encryption, " he says.
Unlike some other mail encryption utilities such as SigabaSecure, introduced last week, Disappearing Email doesn't attempt to authenticate the recipient's identity.
They can then use a VeriSign certificate to authenticate themselves for the purpose of exchanging encryption keys used to secure Internet connections.
Vetted art fairs, where art works on sale have to go through strict vetting procedures to authenticate them, are another good bet.
FORBES: Jackson Pollock or Not? Avoiding Fakes in the Art World
After suspicions were raised about his credibility, skeptical investigative South African journalists set out to authenticate his claims and dig deep into his story.
FORBES: Fake South African Billionaire Arrested For Fraud, Homicide Charges
"We urgently need to start reinforcing the system that is currently used to authenticate and identify secure websites and e-mail systems, " said Mr Eckersley.
Bright Simons with mPedigree created a simple and user-friendly technology to instantly authenticate and ensure the safety of pharmaceuticals at the point of purchase.
Republican Arizona Secretary of State Ken Bennett is demanding Hawaiian officials authenticate Obama's U.S. birth certificate, or he may remove the president from the ballot.
Germany, for instance, recently introduced an identity card that lets citizens authenticate themselves online thus creating an alternative to both Google's and Facebook's systems for proving identity.
To file over the Internet, users will need 128-bit encryption software as well as a legitimate identification number located on the census form itself to authenticate the user.
The pontiff described the cloth as an "icon" or an image but was careful not to authenticate as a genuine relic, the BBC's David Willey in Rome reports.
However, he did say that the bureau will rely on browser-based encryption and a user identification number found on each of the census short forms to authenticate users.
CNN: Census Bureau will allow millions of citizens to file census forms online
He said if the engines are able to be brought to the surface and a serial number can be found, it would be easy to authenticate the find.
CNN: Amazon chief plans to recover Apollo engines from seafloor
At the time, efforts to authenticate the e-mails were unsuccessful.
FORBES: South Carolina newspaper waited six months to take Mark & Maria love e-mails public
For example, security of an endpoint device becomes less of a risk management factor if data is protected and authorized users must authenticate their identities to gain access to it.
Finding his glove is a long shot: Vintage gloves, according to David Kohler, have been historically hard to authenticate, because they were rarely made for specific players in those days.
应用推荐