Authentication

Results: 7063



#Item
991Interfaces for Personal Identity Verification

Interfaces for Personal Identity Verification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2016-02-16 14:47:45
992EM For Windows™ Compliance Pack Do You Need Compliance Pack? Compliance Features User authentication Electronic signatures Full audit trail

EM For Windows™ Compliance Pack Do You Need Compliance Pack? Compliance Features User authentication Electronic signatures Full audit trail

Add to Reading List

Source URL: www.lkc.com

Language: English - Date: 2013-12-09 15:54:26
    993QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable DQLectives Platform v2

    QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable DQLectives Platform v2

    Add to Reading List

    Source URL: qlectives.eu

    Language: English - Date: 2011-03-17 06:51:42
    994Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology   Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

    Fast and Secure CBC-Type MAC Algorithms Mridul Nandi National Institute of Standards and Technology Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known meth

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      995Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington  Alexander Moshchuk

      Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:06
      996The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2007-03-29 16:18:56
      997authuser(3zm)  authuser(3zm) NAME authuser − remote authentication library using the Authentication Server

      authuser(3zm) authuser(3zm) NAME authuser − remote authentication library using the Authentication Server

      Add to Reading List

      Source URL: www.zmailer.org

      Language: English - Date: 2006-12-13 14:07:47
        998End-to-end Design of a PUF based Privacy Preserving Authentication Protocol Aydin Aysu (Virginia Tech) Ege Gulcan (Virginia Tech) Daisuke Moriyama (NICT) Patrick Schaumont (Virginia Tech)

        End-to-end Design of a PUF based Privacy Preserving Authentication Protocol Aydin Aysu (Virginia Tech) Ege Gulcan (Virginia Tech) Daisuke Moriyama (NICT) Patrick Schaumont (Virginia Tech)

        Add to Reading List

        Source URL: www.cryptoexperts.com

        Language: English - Date: 2015-11-13 04:48:41
          999DATA SHEET  CA Risk Authentication At a Glance  CA Risk Authentication allows you to provide real-time protection against identity theft and online fraud via intelligent

          DATA SHEET CA Risk Authentication At a Glance CA Risk Authentication allows you to provide real-time protection against identity theft and online fraud via intelligent

          Add to Reading List

          Source URL: www.ca.com

          Language: English
            1000Secure Modular Password Authentication for the Web Using Channel Bindings Mark Manulis1 , Douglas Stebila2 , and Nick Denham2 1  Surrey Centre for Cyber Security, University of Surrey, UK

            Secure Modular Password Authentication for the Web Using Channel Bindings Mark Manulis1 , Douglas Stebila2 , and Nick Denham2 1 Surrey Centre for Cyber Security, University of Surrey, UK

            Add to Reading List

            Source URL: manulis.eu

            Language: English - Date: 2015-03-31 12:21:55