Access Authentication

Results: 2034



#Item
851Access control / Authentication / Notary / Packaging / Provenance / Museology / Authenticity in art / Arthur Streeton / Art forgery / Security / Archival science / Art history

… IS NOT GOLD Robyn Sloggett Ian Potter Museum of Art, University of Melbourne, Vic Paper presented at the Art Crime

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-06-04 14:36:24
852Computer network security / Password / Security token / Authentication / Single sign-on / Kerberos / Two-factor authentication / Self-service password reset / Security / Computer security / Access control

Federal Information Processing Standards Publication 190

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-18 11:39:46
853Computer security / Password / Security token / Login / User / Two-factor authentication / Transaction authentication number / Su / Access token / Security / Access control / Computing

USER MANUAL e-SUBMISSION SYSTEM OF CENTRAL REGISTRY OF DRUG ABUSE

Add to Reading List

Source URL: www.nd.gov.hk

Language: English - Date: 2012-11-09 03:14:49
854Wireless networking / Signaling System 7 / Cryptographic protocols / Computer network security / EAP-SIM / Extensible Authentication Protocol / IEEE 802.1X / Mobile Application Part / Subscriber identity module / Computing / Telephony / Information

Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly.

Add to Reading List

Source URL: interlinknetworks.com

Language: English - Date: 2012-02-18 13:52:53
855Identity management / Authentication / Notary / Packaging / Two-factor authentication / Federated identity / Password / Electronic authentication / Multi-factor authentication / Security / Cryptography / Access control

Electronic Authentication Animations – Two-factor Authentication (Script) Introduction Joe needs to implement an e-authentication module in an information system. colleague Alan introduces the three basic authenticati

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
856Identification / Surveillance / Access control / Password / Authentication / Visa Inc. / Biometric passport / Two-factor authentication / Security / National security / Biometrics

Generation Z ready for biometric security to replace passwords Three-quarters of[removed]year olds would feel comfortable using biometric security 69% believe it will be faster and easier than passwords and PINs Half of yo

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-01-23 05:10:37
857Matrices / Access control / Authentication / Notary / Packaging / Singular value decomposition / Stylometry / Art forgery / Inverse problem / Algebra / Linear algebra / Mathematics

20th International Congress on Modelling and Simulation, Adelaide, Australia, 1–6 December 2013 www.mssanz.org.au/modsim2013 Art Authentication from an Inverse Problems Perspective R. J. Sloggett a , R. S. Anderssen b

Add to Reading List

Source URL: www.mssanz.org.au

Language: English - Date: 2013-11-19 22:00:04
858Computer security / Access token / Password / SecurID / Computing / Two-factor authentication / Security token / Online banking / Security

Microsoft Word - 10 Removing a token 3Sep2012

Add to Reading List

Source URL: www.westpac.com.au

Language: English - Date: 2014-08-23 01:16:51
859Simple Mail Transfer Protocol / Extended SMTP / MX record / Post Office Protocol / SMTP Authentication / Message transfer agent / Internet Message Access Protocol / Port / Local Mail Transfer Protocol / Email / Computer-mediated communication / Computing

Network Working Group Request for Comments: 5321 Obsoletes: 2821 Updates: 1123 Category: Standards Track

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2008-10-01 19:14:40
860McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
UPDATE