Authentication

Results: 7063



#Item
131

Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

Add to Reading List

Source URL: liu.diva-portal.org

- Date: 2010-06-16 03:36:14
    132

    Insecure by Default? Authentication Services in Popular Web Frameworks Hannah Li and David Evans, University of Virginia hhannahli, According to BuiltWith.com, 37% of Alexa’s top 10K

    Add to Reading List

    Source URL: www.cs.virginia.edu

    - Date: 2016-08-18 09:41:56
      133

      LexisNexis ® TrueID ® Accurate. Fast. On-Premise. Authentication. LexisNexis ® TrueID ® helps you recognize a true identity and fight fraud in real time

      Add to Reading List

      Source URL: www.lexisnexis.com

      - Date: 2015-08-25 15:45:57
        134

        DANE and DNSSEC Authentication Chain Extension for TLS Shumon Huque (with Melinda Shore, Richard Barnes, and Willem Toorop) IETF 93, DANE Working Group

        Add to Reading List

        Source URL: www.ietf.org

        - Date: 2015-07-20 05:29:28
          135

          WHATdISdAdUNCGd2FAd HARDWAREdTOKEN? FacultyD.staff.and.students.are.encouraged.to.use.two-factor) authentication)(2FA).to.protect.their.UNCG.accounts.and.

          Add to Reading List

          Source URL: its.uncg.edu

            136

            A Meta-Scheme for Authentication Using Text Adventures By Carson Dylan Brown

            Add to Reading List

            Source URL: people.scs.carleton.ca

            - Date: 2011-04-19 13:43:15
              137

              Smart Card Logon Service Offer This professional services offer includes the services required to implement smart card logon, thereby enabling strong authentication in your Windows domain. The offer can be summarized in

              Add to Reading List

              Source URL: www.omegapoint.us

              - Date: 2013-02-26 14:50:04
                138

                Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

                Add to Reading List

                Source URL: www.andrew.cmu.edu

                - Date: 2016-12-11 19:02:53
                  139

                  Privacy, Discovery, and Authentication for the Internet of Things (Extended Version) arXiv:1604.06959v2 [cs.CR] 11 JulDavid J. Wu1 , Ankur Taly2 , Asim Shankar2 , and Dan Boneh1

                  Add to Reading List

                  Source URL: arxiv.org

                  - Date: 2016-07-11 20:32:25
                    140

                    CALIPER: Continuous Authentication Layered with Integrated PKI Encoding Recognition Ethan M. Rudd and Terrance E. Boult University of Colorado at Colorado Springs Vision and Security Technology (VAST) Lab {erudd,tboult}@

                    Add to Reading List

                    Source URL: www.cv-foundation.org

                    - Date: 2016-05-30 11:04:05
                      UPDATE