Authentication

Results: 7063



#Item
171

Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

Add to Reading List

Source URL: cups.cs.cmu.edu

- Date: 2007-07-24 11:28:38
    172

    Strengthening Public Key Authentication against Key Theft Short Paper Martin Kleppmann1 and Conrad Irwin2 1

    Add to Reading List

    Source URL: martin.kleppmann.com

    - Date: 2016-08-24 14:47:03
      173

      Group Message Authentication Bartosz Przydatek1 and Douglas Wikstr¨ om2 1 Google Switzerland

      Add to Reading List

      Source URL: www.nada.kth.se

      - Date: 2012-05-30 08:54:12
        174

        Data Synchronization in Privacy-Preserving RFID Authentication Schemes S´ebastien CANARD and Iwen COISEL Orange Labs R&D - Caen - France RFIDSec 08 - 10th July 2008

        Add to Reading List

        Source URL: events.iaik.tugraz.at

        - Date: 2008-07-09 09:10:22
          175

          Introduction to Email Authentication An explanation of how SPF, DKIM, and DMARC function 2Q 2015

          Add to Reading List

          Source URL: dmarc.org

          - Date: 2015-09-16 19:34:55
            176

            Biometric Attendance Authentication System (Nodal Officer User Manual for Transfer) Transfer: Transfer module is used for transfer the employee from one organization/unit to another. Steps for transferring the employee a

            Add to Reading List

            Source URL: attendance.gov.in

            - Date: 2016-04-29 06:29:36
              177

              Identity – Authentication Management Identity Management is a centrally controlled enterprise capability used at all echelons (via standard policy enforcement points that leverage Army Knowledge Online, Common-Access

              Add to Reading List

              Source URL: netcom.army.mil

              - Date: 2009-10-26 18:13:04
                178

                Assessing Early Spanish Explorer Routes Through ∗ Authentication of Rock Inscriptions Ronald I. Dorn, Gordon Moore, and Eduardo O. Pag´an Arizona State University Todd W. Bostwick

                Add to Reading List

                Source URL: alliance.la.asu.edu

                - Date: 2012-07-28 17:47:24
                  179

                  Using Identity Authentication to Expand Straight Through Processing IdenTrust B

                  Add to Reading List

                  Source URL: www.identrust.com

                  - Date: 2012-07-10 20:41:43
                    180

                    ESET Secure Authentication Custom Integration via the SDK and API Document Version 1.0 ESET Secure Authentication

                    Add to Reading List

                    Source URL: static5.esetstatic.com

                    - Date: 2015-02-12 05:48:39
                      UPDATE