Definitions
Sorry, no definitions found. Check out and contribute to the discussion of this word!
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word authentification.
Examples
-
The meeting agreed that Phase I of this project, dealing with one-stop services which do not require security measures such as authentification, would be implemented during the first half of
-
Any client connecting here should do some kind of authentification to be sure this is our dll not just a loitering web
-
Any client connecting here should do some kind of authentification to be sure this is our dll not just a loitering web
-
But what has been used (for authentification) for at least the last century has been the scholarship and experiance of those who have spent a lifetime studying the technique of any of these artists, and "knowing them", if you will, to a degree that they become the leading arbiters in the field.
New da Vinci Discovered Thanks to Hunch and A Fingerprint » E-Mail 2009
-
But what has been used (for authentification) for at least the last century has been the scholarship and experiance of those who have spent a lifetime studying the technique of any of these artists, and "knowing them", if you will, to a degree that they become the leading arbiters in the field.
New da Vinci Discovered Thanks to Hunch and A Fingerprint 2009
-
He had all call signs right, authentification code right, and I know Sergeant Cruz well and recognized his voice.
Dead Zero Stephen Hunter 2010
-
He had all call signs right, authentification code right, and I know Sergeant Cruz well and recognized his voice.
Dead Zero Stephen Hunter 2010
-
Only students with a Stanford-issued email address could join, and that email authentification ensured that each person was who they said they were.
The Facebook Effect David Kirkpatrick 2010
-
Though Assange says they have a rigorous authentification process, he said Tuesday WikiLeaks does not know the source of the leaked documents, adding, "we never know the source of the leak."
Janine R. Wedel: Shadow Elite: WikiLeaks: Irresponsible or Indispensable? 2010
-
There are also recognized expert committees where you can submit your stamps for authentification.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.