Access Authentication

Results: 2034



#Item
661Security / Federated identity / Access control / Security Assertion Markup Language / SAML 2.0 / Shibboleth / SAML 1.1 / Authentication / CANARIE / Identity management / Computer security / Identity

Canadian Access Federation: Trust Assertion Document (TAD)

Add to Reading List

Source URL: www.rsc.org

Language: English - Date: 2014-12-22 04:46:06
662Authentication / Notary / Packaging / Password / Biometrics / Two-factor authentication / Security / Cryptography / Access control

Calibrand the currency for talent® Preserving the Integrity of the Currency for Talent®: Using Double Factor Authentication to Prevent Counterfeiting Thursday 12th November 2009

Add to Reading List

Source URL: www.calibrand.com

Language: English - Date: 2014-09-05 04:42:27
663Identity management systems / Identity management / Password management / Password / Two-factor authentication / Self-service password reset / User provisioning software / Hitachi ID Systems / Security / Computer security / Access control

DATASHEET USER PROFILE MANAGER User Lifecycle Management for IBM i THE CHALLENGE

Add to Reading List

Source URL: static.helpsystems.com

Language: English - Date: 2014-02-04 11:45:29
664Password / Password strength / Password cracking / Security / Access control / Computer security

Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation ZIMING ZHAO and GAIL-JOON AHN, Arizona State University HONGXIN HU, Clemson University Picture gesture authentication has been

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2015-04-22 20:39:00
665Password / Access control / Identity document / Security Assertion Markup Language / Two-factor authentication / Mobile identity management / Security / Identity management / Identity

Usher 2.2 Usher Mobile Identity Platform Usher™ is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterpris

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-11-18 10:40:30
666Cyberwarfare / NTLM / LM hash / Kerberos / Pass the hash / Integrated Windows Authentication / Ticket Granting Ticket / Password / Rainbow table / Computer security / Cryptography / Computer network security

A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 18:04:53
667Technology / IEEE 802.1X / Computer security / IEEE 802.11 / Wireless LAN / Wireless access point / Password authentication protocol / Service set / Cracking of wireless networks / Computer network security / Wireless networking / Computing

802.11: Use, Misuse and the Need for a Robust Security Toolkit David Pollino Mike Schiffman

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:34:14
668Hand geometry / Iris recognition / Access control / Fingerprint / Authentication / Automated fingerprint identification / Biometric points / BioAPI / Biometrics / Security / Keystroke dynamics

Everything You Need to Know About Biometrics By Erik Bowman, Identix Corporation January 2000 A technology that has been around Chances are this is not your first exposure to the field of biometric identification. After

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
669Identity / Federated identity / Access control / Security Assertion Markup Language / Shibboleth / SAML 2.0 / Single sign-on / Public key certificate / Authentication / Security / Identity management / Computer security

Microsoft Word - Benelogic_incommon_pop.docx

Add to Reading List

Source URL: www.benelogic.com

Language: English - Date: 2012-12-05 16:48:03
670Secure communication / Cryptographic protocols / HTTP / Electronic commerce / Java platform / Digest access authentication / HTTP Secure / Certificate authority / Cross-site scripting / Cryptography / Security / Computing

Securing Java Web Applications This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authenticat

Add to Reading List

Source URL: www.batky-howell.com

Language: English - Date: 2014-12-29 13:10:38
UPDATE