UAM

(redirected from User Authentication Module)
AcronymDefinition
UAMUniversidad Autonoma Metropolitana (México)
UAMUniversidad Autónoma de Madrid (Spain)
UAMUniversity Art Museum (UC Santa Barbara)
UAMUser Authentication Module
UAMUser Access Manager
UAMUniversal Access Method
UAMUniversity of Arkansas-Monticello (Monticello, Arkansas)
UAMUniwersytet im. Adama Mickiewicza (Adam Mickiewicz University, Poland)
UAMUnion des Artistes Modernes (French: Union of Modern Artists)
UAMUtility Asset Management (various locations)
UAMUser Authentication Module (Microsoft software for secure networking between Mac computers and Windows NT Servers)
UAMUser Account Manager (software)
UAMUser Authentication Method
UAMUniversidad Autónoma de Manizales (Colombia)
UAMUrban Airshed Model
UAMUser Access Management
UAMUniversal American Corporation (stock symbol)
UAMUnicenter Asset Management
UAMUnit Atom Model (physics)
UAMUrawa Art Museum (Saitama, Japan)
UAMUnion Alliance Media
UAMUnderwater-to-Air Missile
UAMUnité d'Appui Multimédia (French: Multimedia Support Unit; Belgium)
UAMUnified Authentication Model
UAMUser Alert Message
UAMUnrelated Adult Male
UAMUnited Aerial Mapping
UAMUser Access Module
UAMUser to Access Mapper
UAMUnified Account Management
UAMUnit AIMNET Manager (US Air Force)
References in periodicals archive ?
Together with ClearPlay's user authentication module, bundles can be created around just about any business model you choose, from subscription-based to transactional upsell to ...
K-manager consists of four modules, that are, key analysis (K-analysis), single key generation module (SKGM), union key generation module (UKGM), noise filter module (NFM), and user authentication module (UAM).
Biometric Identification, Inc., a provider of fingerprint identification software and readers systems announced it has integrated support for Polaroid's low-cost PFS-100 fingerprint scanner into its MV-1000 strong user authentication module. The advanced MV-1100 embedded biometric solution provides a full-featured yet cost-effective way to reliably and accurately verify an individual's identity when a host PC is not available or considered secure.