Access Authentication

Results: 2034



#Item
101Computer access control / Equipment / Office equipment / Cryptography / Civil law notary / Notaries / Authentication / Computer security / Email / Gesellschaft mit beschrnkter Haftung / Fax

If you would like to purchase shares in a shelf company, please complete this form in full and send it to DNotV GmbH. We will reserve the next available company for you after receipt. Preparation form (GmbH) dated ……

Add to Reading List

Source URL: www.dnotv.de

Language: English - Date: 2016-06-07 05:05:01
102Computer access control / Cryptography / Computer security / Prevention / Password / Security / Login / Authentication / Password strength / Password notification email

Getting started with the ECDC Map Maker - EMMa This guide explains how you get access to EMMa as a new user. It consists of three sections:  Registering as a user – describes how to set yourself up as an EMMa user.

Add to Reading List

Source URL: emma.ecdc.europa.eu

Language: English - Date: 2015-05-18 03:47:48
103Computer access control / Computer security / Access control / Security / Multi-factor authentication / Password / Authentication / Security token / RSA SecurID / Phishing / Electronic authentication

Microsoft PowerPoint - OConnor_RoleOfLocationInCybersecurity_Final.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2013-11-20 20:27:34
104Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
105Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
106Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English
107Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
108Economy / Payment systems / Computer access control / Money / E-commerce / Finance / EMV / One-time password / 3-D Secure / Authentication / Multi-factor authentication / Mobile payment

AN EMV MIGRATION FORUM WHITE PAPER Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

Add to Reading List

Source URL: www.emv-connection.com

Language: English - Date: 2016-08-02 12:07:00
109Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Computer access control / Internet Standards / Internet protocols / Transport Layer Security / OpenSSL / Authentication / Password

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
110Computer access control / Pharmaceutical industry / Validity / Authentication / Notary / Packaging / Validation / Business / Computer security / Security

UCD Activities and Progress 2014–11–18 Mark Rose and Rich Keller PDS User Centered Design

Add to Reading List

Source URL: mgmt.pds.nasa.gov

Language: English - Date: 2014-11-18 09:37:20
UPDATE