Access Authentication

Results: 2034



#Item
81Computer access control / Prevention / Password / Security / Computing / CAPTCHA / Form / Password fatigue / Transaction authentication number

PDF Document

Add to Reading List

Source URL: efiling.supremecourt.lk

Language: English - Date: 2014-10-27 09:51:46
82Cryptography / Computer access control / Certificate authority / Security token / Man-in-the-browser / Multi-factor authentication / Smart card / Authentication / IdenTrust

IdenTrust™ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
83Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
84Computer access control / Computer security / Computing / Security Assertion Markup Language / Single sign-on / Authentication / Spotfire / HTTP cookie / Identity provider / TIBCO Software

Business Team Busy Working Talking Concept

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2016-06-30 13:53:16
85Security / Computer access control / Access control / Computer security / Identity management / Authentication / Notary / Delegation / Authorization / PERMIS / User

Proceedings Template - WORD

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-10 20:06:13
86Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
87Economy / Computer access control / Money / Financial technology / Payment systems / E-commerce / Digital currencies / Electronic funds transfer / Strong authentication / 3-D Secure / Multi-factor authentication / Authentication

  European Banking Authority One Canada Square (Floor 46) Canary Wharf

Add to Reading List

Source URL: www.isignthis.com

Language: English - Date: 2016-02-14 19:52:32
88Prevention / Computer access control / Cryptography / Gesture / Security / Multi-touch / Authentication / Password

User-Generated Free-Form Gestures for Authentication: Security and Memorability Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-18 21:13:10
89Security / Computer security / Computer access control / Access control / Identity management / Perimeter security / PERMIS / Trust management / Authentication / Authorization

The Role of Trust Management in Distributed Systems Security Matt Blaze1 , Joan Feigenbaum1 , John Ioannidis1 , and Angelos D. Keromytis2 1 AT&T Labs - Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:48:32
90Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
UPDATE