authentification love

authentification

Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word authentification.

Examples

  • The meeting agreed that Phase I of this project, dealing with one-stop services which do not require security measures such as authentification, would be implemented during the first half of

    ANC Daily News Briefing 2003

  • Any client connecting here should do some kind of authentification to be sure this is our dll not just a loitering web

    Freelancer.com - New Projects 2010

  • Any client connecting here should do some kind of authentification to be sure this is our dll not just a loitering web

    Freelancer.com - New Projects 2010

  • But what has been used (for authentification) for at least the last century has been the scholarship and experiance of those who have spent a lifetime studying the technique of any of these artists, and "knowing them", if you will, to a degree that they become the leading arbiters in the field.

    New da Vinci Discovered Thanks to Hunch and A Fingerprint » E-Mail 2009

  • But what has been used (for authentification) for at least the last century has been the scholarship and experiance of those who have spent a lifetime studying the technique of any of these artists, and "knowing them", if you will, to a degree that they become the leading arbiters in the field.

    New da Vinci Discovered Thanks to Hunch and A Fingerprint 2009

  • He had all call signs right, authentification code right, and I know Sergeant Cruz well and recognized his voice.

    Dead Zero Stephen Hunter 2010

  • He had all call signs right, authentification code right, and I know Sergeant Cruz well and recognized his voice.

    Dead Zero Stephen Hunter 2010

  • Only students with a Stanford-issued email address could join, and that email authentification ensured that each person was who they said they were.

    The Facebook Effect David Kirkpatrick 2010

  • Though Assange says they have a rigorous authentification process, he said Tuesday WikiLeaks does not know the source of the leaked documents, adding, "we never know the source of the leak."

    Janine R. Wedel: Shadow Elite: WikiLeaks: Irresponsible or Indispensable? 2010

  • There are also recognized expert committees where you can submit your stamps for authentification.

    Chinese Stamp of Approval 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.