Authentication

Results: 7063



#Item
121

Reproduced by permission of Warren Communications News, Inc, www.warren-news.com Call Authentication NOI Seen as Prod to Telco Movement on IP Network Robocalls The FCC, by putting a call authentication fra

Add to Reading List

Source URL: www.atis.org

- Date: 2017-07-10 13:01:28
    122

    Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication Matthias Wachs, Quirin Scheitle, Georg Carle Chair of Network Architectures and Services Technical University of Munich (TUM) E

    Add to Reading List

    Source URL: tma.ifip.org

    - Date: 2017-06-17 09:11:30
      123

      Comments to the U.S. Department of Education on Information Collection on Personal Authentication Service (PAS) for FSA ID 79 Fed. RegNov. 20, 2014) January 20, 2015 Introduction These comments are submitted on

      Add to Reading List

      Source URL: www.studentloanborrowerassistance.org

      - Date: 2015-01-20 10:12:24
        124

        Towards Narrative Authentication Or, Against Boring Authentication Anil Somayaji David Mould

        Add to Reading List

        Source URL: people.scs.carleton.ca

        - Date: 2014-01-06 10:04:53
          125

          A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-09-17 07:10:18
            126

            Wireless security with 802.1x and PEAP Steve Riley Senior Consultant, MCS Trustworthy Computing Services 13 JanuaryWireless LAN authentication

            Add to Reading List

            Source URL: blackhat.com

            - Date: 2015-05-28 15:51:53
              127

              Secure authentication and data protection where you need it most In today’s world, you cannot afford to have critical data compromised. With Wavelink Avalanche SecurePlus and Certificate Manager, you receive advanced u

              Add to Reading List

              Source URL: rs.wavelink.com

              - Date: 2015-04-27 16:30:26
                128

                Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

                Add to Reading List

                Source URL: liu.diva-portal.org

                - Date: 2013-04-18 05:30:18
                  129

                  Insecure by Default? Authentication Services in Popular Web Frameworks Hannah Li and David Evans, University of Virginia Motivation Objectives and Preliminary Findings

                  Add to Reading List

                  Source URL: www.cs.virginia.edu

                  - Date: 2016-08-30 20:05:04
                    130

                    Direct proof of security of Wegman-Carter authentication with partially known key Aysajan Abidin and Jan-Åke Larsson Linköping University Post Print

                    Add to Reading List

                    Source URL: liu.diva-portal.org

                    - Date: 2014-11-19 10:41:40
                      UPDATE