Access Authentication

Results: 2034



#Item
621Security / Password / Transport Layer Security / Security token / Database security / IBM Lotus Notes / Computing / Data / Internet standards

Progeny Security Features Your Data is Reliably Secure and Easy to Manage User Identification and Authentication The User ID and encrypted password control who has access to a database. LDAP Integrated Login

Add to Reading List

Source URL: www.progenygenetics.com

Language: English - Date: 2011-08-09 15:31:20
622Internet protocols / Cloud standards / OAuth / Authentication / Authorization / Identity management / Access token / SAML 2.0 / Security Assertion Markup Language / Computer security / Computing / Security

TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

Add to Reading List

Source URL: tech.ebu.ch

Language: English - Date: 2014-10-17 00:18:29
623Access control / Biometrics / Card reader / Multi-factor authentication / FIPS 201 / Authentication / Public key fingerprint / Universal Serial Bus / Smart card / Security / Fingerprints / Identification

Microsoft Word - ma1350.doc

Add to Reading List

Source URL: www.eyenetwatch.com

Language: English - Date: 2010-05-20 07:43:04
624Password / Security token / Single sign-on / Challenge-response authentication / User / Secure Shell / Cryptographic software / Password manager / OTPW / Computer security / Security / Access control

Peer-to-Peer Single Sign-On Security Scheme for Today’s Smart Spaces? Enrique Soriano Salvador Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:53:16
625Computer network security / Federated identity / Single sign-on / Security token / Password / Kerberos / Authentication / Secure Shell / User / Security / Computer security / Access control

A P2P Single Sign-On which remains Single on Smart Spaces ? Enrique Soriano Francisco J. Ballesteros Gorka Guardiola Laboratorio de Sistemas

Add to Reading List

Source URL: lsub.org

Language: English - Date: 2014-05-08 10:42:13
626Security / Access control / User / Multi-touch / Touchscreen / Two-factor authentication / Password manager / User interface techniques / Password / Computing

The Use of Pseudo Pressure in Authenticating Smartphone Users 1 Ahmed Sabbir Arif1, Ali Mazalek1, Wolfgang Stuerzlinger2 2

Add to Reading List

Source URL: synlab.gatech.edu

Language: English - Date: 2015-01-21 11:07:49
627Password / Two-factor authentication / One-time password / Payment systems / Electronic commerce / Authentication / Chip Authentication Program / 3-D Secure / Security / Cryptography / Access control

4.1 Application Method Primary User (PU) * Delegated User (DU) * The application can be facilitated

Add to Reading List

Source URL: www.ncb.com.hk

Language: English - Date: 2012-06-29 03:31:19
628Object Oriented Data Technology / Object-oriented programming / Java / Computer security / Jet Propulsion Laboratory / Microsoft Jet Database Engine / Access control / DBase / Security descriptor / Computing / Software / Java programming language

Authentication & Authorization Sean Kelly Object Oriented Data TechnologyNASA JET PROPULSION LABORATORY

Add to Reading List

Source URL: oodt.jpl.nasa.gov

Language: English - Date: 2005-11-03 17:50:07
629Access token / Filesystem Hierarchy Standard / Software / Computing / System software / Daemon

Stanford University July 26, 2014 Daemons, PAGs, and Automated Authentication

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
630Password / ID-based encryption / Authentication / Transaction authentication number / Security / Cryptography / Access control

An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lala & K.K.Goyalb a Department of Mathematics, Institute of Basic Science, Dr.B.R.Ambedkar University, Khandari, AgraU.P)

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-26 05:40:58
UPDATE