Access Authentication

Results: 2034



#Item
371Cryptography / Password / Security / Computer access control / Key / Authentication / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof

LOGO_SECURITYANDTRUSTE_RUSH_36

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:51:00
372Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Security question / Self-service password reset / Password policy

Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

Add to Reading List

Source URL: www.fmo.hawaii.edu

Language: English - Date: 2014-07-21 21:53:18
373Cryptography / FIPS 201 / Standards / Computer access control / Authentication / Smart card / PIV / Public-key cryptography / Cryptographic key types / RSA Security

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
374Computing / Software / Hypertext Transfer Protocol / Internet privacy / Cryptographic protocols / Secure communication / Cross-site request forgery / Computer access control / HTTP cookie / Same-origin policy / Basic access authentication / JavaScript

Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
375Computer security / Computer access control / Access control / Federated identity / Identity management / Computer network security / Identity documents / Electronic authentication / Authentication / Multi-factor authentication / Knowledge-based authentication / Password

White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:43:58
376

SMART Access Management Suite for Higher Education SMART Access Management Suite is a comprehensive solution for authentication and authorization on the Web, which is based on open security standards. It has been develop

Add to Reading List

Source URL: smartjisc.files.wordpress.com

Language: English - Date: 2012-10-19 06:33:55
    377Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

    The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-09-17 14:36:44
    378Prevention / Security / Cryptography / Stylometry / Computer access control / Biometrics / Patrick Juola / Authentication / Password / Writeprint / User interface / Keystroke dynamics

    Active Linguistic Authentication Revisited: Real-Time Stylometric Evaluation towards Multi-Modal Decision Fusion Ariel Stolerman Drexel University Philadelphia, PA

    Add to Reading List

    Source URL: www.stolerman.net

    Language: English - Date: 2015-11-30 21:10:47
    379Security / Prevention / Computer access control / Access control / Authentication / Notary / Packaging / Password / Computer security

    How do I activate my new Security Device? QUICK GUIDE (For System Administrators and End Users)

    Add to Reading List

    Source URL: www.hsbcnet.com

    Language: English - Date: 2012-08-06 17:09:12
    380Identity management / Computer security / Computer access control / Identity / Federated identity / Identity assurance / Authentication / Multi-factor authentication / Knowledge-based authentication / Identity document / Electronic authentication / Identity score

    White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:03
    UPDATE