Access Authentication

Results: 2034



#Item
461Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:17:06
462Internet standards / Access token / Computer security / OAuth / JavaScript / OpenID / Hypertext Transfer Protocol / Security token / RADIUS / Computing / Cloud standards / Internet protocols

Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Add to Reading List

Source URL: www.umityalcinalp.com

Language: English - Date: 2013-01-24 18:05:14
463Fingerprints / Access control / Identity management / Fingerprint recognition / Authentication / Password / Fingerprint / Two-factor authentication / Fingerprint SDK / Security / Biometrics / Identification

Part A. System Design, Components and Parameters Please describe the system architecture in detail. In particular, is enrollment and authentication done locally or on a server? - The enrolment and authentication is done

Add to Reading List

Source URL: www.logicomedia.com

Language: English - Date: 2015-05-06 11:28:34
464Access control / Federated identity / Two-factor authentication / Access token / Security Assertion Markup Language / Identity provider / One-time password / Computer security / Security / Identity management

Centralized Authen ca on Gateway ❶ Access Applica on ❷ Request Authen ca on

Add to Reading List

Source URL: www.securemetric.com

Language: English - Date: 2014-05-28 02:46:13
465Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Wired Equivalent Privacy / Wireless security / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / RC4 / Cryptography / Computer network security / Wireless networking

Identifying and Responding to Wireless Attacks Chris Hurley (roamer) Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
466Identity management / Cryptographic software / Federated identity / Cryptography / Password / OTPW / Single sign-on / Two-factor authentication / One-time password / Security / Computer security / Access control

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes∗ Joseph Bonneau University of Cambridge Cambridge, UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-03-19 13:28:32
467Identity management / Security token / Password / Biometrics / Authentication / Aladdin Knowledge Systems / Universal Serial Bus / EEPROM / Automated teller machine / Security / Access control / Two-factor authentication

Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices The Black Hat Briefings 2005 Joe Grand Grand Idea Studio, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
468Subversion / Web application frameworks / Django / Apache Subversion / Software / Free software / Concurrent Versions System

Q1. Is direct access available to a database containing the WGs, WG Chairs, Areas, Area Directors, etc.? A1. Yes. Q2. How will authentication be handled? Will direct database access to the datatracker accounts be availab

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2013-04-23 17:48:11
469Application programming interfaces / Computer security / API Management / Identity management / Privileged Identity Management / Two-factor authentication / Cloud applications / Infrastructure optimization / Accellion /  Inc. / Cloud computing / Computing / Centralized computing

BUYER’S GUIDE Identity, Access and API Management Solutions

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2015-02-20 17:46:41
470Identity management / Privileged password management / Password / Cryptographic software / Two-factor authentication / Secure Shell / Lieberman Software / Password fatigue / Security / Access control / Computer security

DATASHEET Comprehensive Privilege Safe Functionality for Your Most Important Administrative Access Credentials

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:21:36
UPDATE