Authentication

Results: 7063



#Item
1Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:59
2Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. Rasmussen

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2017-04-23 04:46:45
3Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-02-28 05:05:12
4FACT SHEET  IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

FACT SHEET IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal data

Add to Reading List

Source URL: futurae.com

Language: English - Date: 2018-10-17 07:54:29
5EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and Passwords

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
6API (/api/)  Generated: Tue, 04 Sep:45:31 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

API (/api/) Generated: Tue, 04 Sep:45:31 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

Add to Reading List

Source URL: docs-archive.fastly.com

Language: English - Date: 2018-10-01 11:52:38
71  Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
8Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication

Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
9Application Programming Interface  REST API Authentication https://api.bittxn.com/api/v1/b2trade/auth [POST] Request params

Application Programming Interface REST API Authentication https://api.bittxn.com/api/v1/b2trade/auth [POST] Request params

Add to Reading List

Source URL: bittxn.com

Language: English - Date: 2018-08-01 05:59:46
10On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1  Departement d’Informatique

On the (Im)possibility of Blind Message Authentication Codes Michel Abdalla1 , Chanathip Namprempre2 , and Gregory Neven1,3 1 Departement d’Informatique

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:23