Authentication

Results: 7063



#Item
1Identification / Computing / Cryptography / Security engineering / Touchscreens / Multi-touch / Biometrics / Gesture / Authentication / Support vector machine / Shoulder surfing / Tablet computer

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:59
2Biometrics / Security engineering / Cryptography / Computing / Identification / Machine learning / Surveillance / Security / Keystroke dynamics / Type I and type II errors / Password / Data corruption

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:46:45
3Cryptography / Public-key cryptography / Elliptic curve cryptography / Digital Signature Standard / Key management / Elliptic Curve Digital Signature Algorithm / Digital signature / Digital Signature Algorithm / EdDSA / Key / Domain Name System Security Extensions / Homomorphic encryption

Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-28 05:05:12
4Computer access control / Cryptography / Computer security / Access control / Multi-factor authentication / Authentication / Transaction authentication number / QR code

FACT SHEET IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

Add to Reading List

Source URL: futurae.com

Language: English - Date: 2018-10-17 07:54:29
5Cryptography / Computer security / Cryptographic hash functions / Password / Rainbow table / SHA-2 / Password strength / Salt

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
6Computer access control / Computer security / Access control / Security engineering / Multi-factor authentication / Access token / One-time password / Application programming interface key / Application programming interface / Token coin / Web API security / Security token

API (/api/) Generated: Tue, 04 Sep:45:31 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

Add to Reading List

Source URL: docs-archive.fastly.com

Language: English - Date: 2018-10-01 11:52:38
7Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
8Phonetics / Computer access control / Human voice / Linguistics / Human behavior / Radar / Wave mechanics / Targeting / Articulator / Doppler radar / Articulation / Doppler effect

Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
9Mathematics / Computing / Computer access control / Ajax / JSON / Meter Point Administration Number / Integer / Null / Data type / Authentication / Decimal

Application Programming Interface REST API Authentication https://api.bittxn.com/api/v1/b2trade/auth [POST] Request params

Add to Reading List

Source URL: bittxn.com

Language: English - Date: 2018-08-01 05:59:46
10Cryptography / Public-key cryptography / Message authentication codes / Error detection and correction / Financial cryptography / Digital signature / Blind signature

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:23
UPDATE