Authentication

Results: 7063



#Item
151

SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option Daniel Buschek, Fabian Hartmann, Emanuel von Zezschwitz, Alexander De Luca, Florian Alt University of Munich (LMU), Germany {daniel.bus

Add to Reading List

Source URL: www.medien.ifi.lmu.de

- Date: 2016-02-10 16:42:19
    152

    A Novel Approach for Authentication Technique in Wireless Sensor Networks D. Prasad Research Scholar, Annamalai University, Chidambaram,

    Add to Reading List

    Source URL: www.ijmetmr.com

    - Date: 2015-01-13 06:03:01
      153

      Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

      Add to Reading List

      Source URL: iaoc.ietf.org

      - Date: 2015-11-01 16:21:27
        154

        IdenTrust™ Super DSMS Server Hosted Online Signature Verification and Certificate Processing The growth of online business depends upon identity authentication that can be trusted. While solution vendors around the wor

        Add to Reading List

        Source URL: www.identrust.com

        - Date: 2012-07-10 20:41:45
          155

          XignQR The X in Signatures The Quick Response Authentication & Signature System Inhalt

          Add to Reading List

          Source URL: www.xignsys.com

          - Date: 2016-03-13 15:17:18
            156

            Microsoft Word - 20091126_Windows_Logon_Authentication

            Add to Reading List

            Source URL: www.vasco.co.jp

            - Date: 2009-11-26 02:32:03
              157

              1 + 1 = You Measuring the comprehensibility of metaphors for configuring backup authentication Stuart Schechter

              Add to Reading List

              Source URL: cups.cs.cmu.edu

              - Date: 2009-05-29 14:59:10
                158

                System Impact Bugs · Security vulnerability · Authentication, message integrity, or system

                Add to Reading List

                Source URL: wiki.allseenalliance.org

                - Date: 2015-06-11 15:04:29
                  159

                  PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

                  Add to Reading List

                  Source URL: www.vast.uccs.edu

                  - Date: 2012-07-06 12:46:22
                    160

                    Endpoint--Secure-Authentication-PO.indd

                    Add to Reading List

                    Source URL: static4.esetstatic.com

                    - Date: 2016-03-15 08:12:54
                      UPDATE