Access Authentication

Results: 2034



#Item
301Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
302Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

Public Comments Received on NIST SP: Electronic Authentication Guideline

Add to Reading List

Source URL: csrc.nist.gov

Language: English
303Computer access control / Password / Authentication / HTTP cookie / Login / Pico / Security token

Bootstrapping adoption of the Pico password replacement system Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington {frank.stajano, graeme.jenkinson, jeunese.payne, max.s

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-08-28 15:17:52
304Computer access control / Identity management / Federated identity / Cloud standards / OpenID / OAuth / Security Assertion Markup Language / Password manager / Single sign-on / XRDS / Authentication / Phishing

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-04-20 11:46:50
305Computer network security / Wi-Fi / Wireless networking / IEEE 802.11 / Wi-Fi Protected Access / IEEE 802.1X / AirPort / Wireless security / Extensible Authentication Protocol

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XPanther) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirement

Add to Reading List

Source URL: www.it.mtu.edu

Language: English
306Computer security / Identity management / Cryptography / Computer access control / Access control / Authentication / Notary / Packaging / Password / Internet privacy / Privacy Commissioner / Privacy

State Services Commission

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:46:13
307Online banking / Computer access control / Transaction authentication number / Wirecard / International Bank Account Number / Deposit account / Bank

Agreement Use of eBanking with PIN and TAN Customer number: Name and address of account holder:

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2016-01-14 06:57:56
308Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:42:08
309Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2014-12-09 05:42:43
310Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
UPDATE