Access Authentication

Results: 2034



#Item
61Computer access control / Cryptography / Computer security / Security / Access control / Usability / Authentication / Notary / Packaging / Implicit authentication / Password

Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:58
62Economy / Finance / Money / Notary / Financial services / Access control / Authentication / Computer access control / Packaging / Pension / PrivatBank

PreStar ™ Your Liberty foundation for vested benefit solution in collaboration with Lienhardt & Partner Privatbank Zürich AG

Add to Reading List

Source URL: docs.liberty-vorsorge.ch

Language: English - Date: 2016-01-18 09:19:51
63Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
64Security / Prevention / Safety / Cryptography / Computer security / E-commerce / Computer access control / Payment Card Industry Data Security Standard / Data security / Payment card / Multi-factor authentication / Information security

Mapping ISO27001 <> PCI-DSS 2.0

Add to Reading List

Source URL: www.forinsect.com

Language: English - Date: 2011-08-26 04:51:29
65Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
66Survey methodology / Genealogy / Demography / Authentication / Computer access control / Notary / Packaging / Census / Questionnaire / Human geography / Usability / Security

Statistics Portugal – Census Unit Anabela Delgado _ Carlota Amorim _ SESSION 3 n#3

Add to Reading List

Source URL: www.simply2010.be

Language: English - Date: 2010-11-30 06:34:37
67Computer access control / Computer security / Access control / Identity management / Password / Security / Multi-factor authentication / Authentication / Password strength / Password manager

THE FACTS: PASSWORDS & SECURING YOUR ACCOUNTS Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords. How do I create a good password?

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
68Computer access control / Security / Computer security / CAPTCHA / Transaction authentication number / Authentication / Challengeresponse authentication / Multi-factor authentication / Internet bot / Turing test / Form

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:41:31
69Computer access control / Security / Computer security / Prevention / Multi-factor authentication / Authentication / Security token / ESET / Information security / Access control / Electronic authentication / Strong authentication

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
70Computer access control / Computer security / Identity management / Federated identity / Shibboleth / IDM / Security Assertion Markup Language / Authentication

Report Market Analysis of IdM Solutions for Swiss edu-ID Name Surname Job Title Document Type:

Add to Reading List

Source URL: projects.switch.ch

Language: English - Date: 2016-07-14 11:47:46
UPDATE