Access Authentication

Results: 2034



#Item
91Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
92Computer access control / Cryptography / Humancomputer interaction / Technical communication / Usability / Authentication / Computer security / Security

SOUPSPersonal Choice and Challenge Questions: A Security and Usability Assessment 16 July 2009

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-16 14:02:05
93Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
94Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
95Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
96Computer access control / Computer security / Federated identity / Identity management / Single sign-on / Password / IceWall SSO / Usability of web authentication systems

SINGLE SIGN ON (SSO) SUPPORT FOR JOIN.ME AUTHENTICATION At join.me, we consider the security of our users a top priority. We integrate with a number of SSO platforms to maintain a highly secure environment without added

Add to Reading List

Source URL: az766929.vo.msecnd.net

Language: English - Date: 2016-06-20 09:36:34
97Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Security hacker / Password strength / Password policy

MISSION: To broaden the knowledge and promote values necessary for Maine’s local and county government Administrators to better serve their communities. A publication of the Maine Town, City

Add to Reading List

Source URL: www.mtcma.org

Language: English - Date: 2015-07-02 11:09:14
98Prevention / Computer access control / Access control / Password / Security / Challengeresponse authentication / Password notification email / Password policy

Black Canada with red flag - CMYK

Add to Reading List

Source URL: www.saskatchewan.ca

Language: English - Date: 2015-10-21 17:07:18
99Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
100Computing / Computer access control / Computer security / Directory services / Federated identity / Internet Standards / Identity management / Lightweight Directory Access Protocol / Shibboleth / Electronic authentication / Authentication / HTTP cookie

PAPI and LDAP Using directories for local authentication and authorization Diego R. López

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
UPDATE