Access Authentication

Results: 2034



#Item
381Computer access control / Computer security / Cryptography / Security / One-time password / Google Authenticator / Sina Weibo / Cross-site request forgery / Authentication / Short Message Service / Multi-factor authentication

Security report for Peatio exchange Peatio is an open source Bitcoin exchange: https://github.com/peatio/peatio    Hijacking the account

Add to Reading List

Source URL: sakurity.com

Language: English - Date: 2016-01-11 15:40:03
382

pack DIGIPASS Pack for Network Authentication “Your Strong Authentication Solution for Network Access” DIGIPASS Pack for Network Authentication provides secure user access to operating systems, servers, applications

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:45
    383Computing / Computer access control / Computer security / Federated identity / Cloud standards / Identity management / Internet protocols / OAuth / OpenID / Mashup / Authentication / WS-Security

    Microsoft Word - Secure Delegation for Web 2.0 Published.doc

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    384Computer access control / Computer security / Cryptography / Password / Login / Authentication / User / Self-service password reset / X display manager

    The ACO, OASIS and Simpler Financials are glad to roll out the Simpler Financials to the County. We hope you find this management reporting tool to be useful in providing you timely, quick and accurate information. A use

    Add to Reading List

    Source URL: www.auditorcontroller.org

    Language: English - Date: 2014-05-22 17:17:24
    385Cybercrime / Computer access control / Phishing / Social engineering / Spamming / Crime / Transaction authentication number / Financial technology / Fraud

    AF-TRUST-GNC - Annual Review Presentations

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    386Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

    SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    387Computing / Cryptography / Computer security / Computer network security / Cyberwarfare / Password / Denial-of-service attack / Firewall / SOAP / Authentication / Public-key cryptography / Internet security

    Evidence-Based Access Control for Ubiquitous Web Services Nishith Khantal IIT, Kanpur

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    388Computer access control / Identity documents / Access control / Authentication / Notary / Packaging / Multi-factor authentication / Personal identification number

    FBMS Personal Identification Verification Card Access The FBMS system has recently migrated to a new platform, changing the path to access FBMS. You will now be required to access FBMS through the Department of the Inter

    Add to Reading List

    Source URL: www.bie.edu

    Language: English - Date: 2015-06-29 15:07:41
    389Computer access control / Security token / Access token / Token / Password / Pseudonymity / Authentication / Blind signature

    FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2011-08-18 16:53:40
    390Computer access control / Federated identity / Computer security / Computing / OpenID / Single sign-on / Phishing / Google Account / Email / Authentication / Identity provider / Login

    EmID: Web Authentication by Email Address Ben Adida∗ Abstract We suggest that OpenID should use email addresses rather than URLs as identifiers, and show how OpenID can be adapted accordingly with relative ease. Email

    Add to Reading List

    Source URL: w2spconf.com

    Language: English - Date: 2012-02-07 16:10:03
    UPDATE