Access Authentication

Results: 2034



#Item
211Computer network security / Directory services / Computer access control / Lightweight Directory Access Protocol / Kerberos / Authentication / Key distribution center

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-10-17 03:55:39
212Computer access control / Identity management / Metadata standards / Signature / Security Assertion Markup Language / EIDAS / Authentication / Password

Security aspects of CLIPS Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica

Add to Reading List

Source URL: eucloudclusters.files.wordpress.com

Language: English - Date: 2016-03-07 06:09:16
213Access control / Computer access control / Authentication / Notary / Packaging / Biometrics

Biometric Attendance Authentication System (Nodal Officer User Manual for Transfer) Transfer: Transfer module is used for transfer the employee from one organization/unit to another. Steps for transferring the employee a

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2016-04-29 06:29:36
214Computer access control / Access control / Authentication / Notary / Packaging / Mediascape

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – MediaScape multi-connection mechanisms and multi-device authentication

Add to Reading List

Source URL: www.mediascapeproject.eu

Language: English - Date: 2016-06-20 03:18:25
215Computer access control / HTTP cookie / Authentication / POA

PDF Document

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2009-04-16 04:29:53
216Gemalto / Secure communication / Cryptography / Computer access control / Computer security / Authentication / Smart card / Online banking / GlobalSign / Gemalto M2M

ROAD TOWARDS MOBILE CREDENTIALS Bring value to students’ life with security Bertrand Michaux April 2016

Add to Reading List

Source URL: www.observatoriotui.com

Language: English
217Computer access control / Humancomputer interaction / Password / Security / Authentication / Usability / Question / Cognitive password / Self-service password reset

Submission to Workshop on Human-Computer Interaction and Security Systems – April 6, 2003 – Fort Lauderdale, Florida Designing Secure Yet Usable Credential Recovery Systems With Challenge Questions Mike Just Treasur

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-15 11:59:36
218Biometrics / Computer access control / Automatic identification and data capture / Speaker recognition / Speech processing / Authentication / Card reader / Tatra banka / Tatra / Interactive voice response / Agnitio

CASE STUDY JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

Add to Reading List

Source URL: old.soitron.sk

Language: English - Date: 2015-07-26 08:46:26
219Federated identity / Identity / Computer access control / Digital identity / Windows CardSpace / Identity management / Online identity / Password / Authentication / Internet privacy / Personal identity / Identity 2.0

Towards Better Digital Identity Management Spring 2006

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-05-19 11:21:55
220Public-key cryptography / Key management / Computer access control / Transport Layer Security / Public key infrastructure / Certificate authority / Smart card / Java / Multi-factor authentication / Authentication / Man-in-the-browser / Public key certificate

PDF Document

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
UPDATE