Access Authentication

Results: 2034



#Item
951Reliability engineering / Access control / Authentication / Notary / Packaging / Database / Computing / Maintenance /  repair /  and operations / Pointer / Maintenance / Information technology management / Security

Examples of recent 2012 Board of Appeals decisions related to Software Innovations This document includes some recent decisions of the EPO in 2012 with regards to software related inventions and shows relevant extracts

Add to Reading List

Source URL: www.bittner-patent.eu

Language: English - Date: 2012-09-28 06:29:12
952Access control / Authentication / Notary / Packaging / Identity document / Electronic authentication / Data security / Two-factor authentication / Electronic identity card / Security / Identity management / Cryptography

Sicherheitsaspekte des neuen deutschen Personalausweises Dennis Kügler Bundesamt für Sicherheit in der Informationstechnik eGov Fokus[removed]:

Add to Reading List

Source URL: www.wirtschaft.bfh.ch

Language: English - Date: 2013-09-17 04:58:09
953Post Office Protocol / STARTTLS / Simple Mail Transfer Protocol / SMTP Authentication / Message transfer agent / Webmail / Port / Email / Computer-mediated communication / Computing

Important facts in a nutshell regarding your account Your user name A user name (e.g., "mueller") will be assigned to you when you activate your account. You will need it to access the university network. If you have for

Add to Reading List

Source URL: w3-mediapool.hm.edu

Language: English - Date: 2014-02-07 14:47:48
954Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / IP Multimedia Subsystem / Multimedia / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V12[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and S

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-05 10:14:26
955Security / Access control / User / Single sign-on / Two-factor authentication / Password / Federated identity / Computer security

OvidToday™ Frequently Asked Questions for Ovid Administrators January 2015 – Release 1.1 What is OvidToday™? OvidToday is an iPad app that allows our institutional customers to use an iPad® to browse and read the

Add to Reading List

Source URL: resourcecenter.ovid.com

Language: English - Date: 2015-01-12 14:52:39
956Password / Computer network security / Authentication / Biometrics / Two-factor authentication / Keystroke dynamics / Security / Computer security / Access control

Session: I Am How I Touch: Authenticating Users CHI 2012, May 5–10, 2012, Austin, Texas, USA Touch me once and I know it’s you! Implicit Authentication based on Touch Screen Patterns

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2012-07-09 11:59:56
957Two-factor authentication / Security token / Authentication / Cryptography / Password manager / Password strength / Security / Access control / Password

Back-of-Device Authentication on Smartphones

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2013-05-06 07:00:20
958Security token / Two-factor authentication / Single sign-on / One-time password / Authentication / Software token / RADIUS / Password / Password manager / Security / Computer security / Access control

Service platforms Authentication Solution Optimized for Smart Devices IKEYA Ryohei, OKADA Hideaki, KOUDA Keito, TEZUKA Yukiko Abstract

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-03-26 09:05:05
959Computer security / Password / Federated identity management / Credential / Authentication / Liberty Alliance / Web Access Management / Identity assurance / Identity management / Security / Identity

Privacy, Security, and Trust with Federated Identity Management Dr. rer. nat. Hellmuth Broda VP Business Development, First Ondemand Ltd. (www.firstondemand.com) Spokesperson, Liberty Alliance; Member of the Business Mar

Add to Reading List

Source URL: hellmuthbroda.com

Language: English - Date: 2009-05-29 15:44:25
960Access control / Password / Passphrase / Password manager / Password cracking / Security / Cryptography / Computer security

Honey, I Shrunk the Keys: Influences of Mobile Devices on Password Composition and Authentication Performance Emanuel von Zezschwitz, Alexander De Luca, Heinrich Hussmann Media Informatics Group, University of Munich (LM

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2014-12-01 10:05:00
UPDATE