Authentication

Results: 7063



#Item
11Computer access control / Cryptography / Computer security / Civil law common law) / Access control / Authentication / Notary / Packaging / Vibration / Password / Touchscreen

VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:59
12Taxation in the United States / Internal Revenue Service / Tax / Government / Computer access control / Tax investigation / Electronic authentication / Treasury Inspector General for Tax Administration / Income tax in the United States / Multi-factor authentication / Preparer Tax Identification Number / Individual Taxpayer Identification Number

COMMITTEE ON WAYS AND MEANS, SUBCOMMITTEE ON OVERSIGHT U.S. HOUSE OF REPRESENTATIVES “The Internal Revenue Service’s Taxpayer Online Authentication Efforts”

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2018-09-28 11:35:23
13Computer access control / Computer security / Cryptography / Federated identity / Webmail / Identity management / Cross-platform software / Google Account / Multi-factor authentication / Password / Gmail / Mail.com

Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

Add to Reading List

Source URL: www.necoma-project.eu

Language: English - Date: 2016-04-22 11:46:30
14Mathematics / Computing / Computer access control / Ajax / JSON / Meter Point Administration Number / Integer / Null / Data type / Authentication / Decimal

Application Programming Interface REST API Authentication https://api.bittxn.com/api/v1/b2trade/auth [POST] Request params

Add to Reading List

Source URL: www.bittxn.com

Language: English - Date: 2018-08-01 05:59:46
15Cryptography / Public-key cryptography / Elliptic curve cryptography / Key management / Digital Signature Standard / Digital signature / Key / Post-quantum cryptography / EdDSA / RSA / Model theory / Digital Signature Algorithm

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-28 04:23:05
16Cryptography / Cryptographic protocols / Cryptographic hash functions / Secure communication / Transport Layer Security / Internet Standards / Cipher suite / Collision attack / MD5 / Man-in-the-middle attack / HMAC / OpenSSL

Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
17Cryptography / Public-key cryptography / Key management / Transport Layer Security / Internet Standards / Public key infrastructure / Domain Name System Security Extensions / Public key certificate / Certificate authority / X.509 / DNS root zone / Man-in-the-middle attack

XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
18Mathematics / Computing / Computer access control / Ajax / JSON / Meter Point Administration Number / Integer / Null / Data type / Authentication / Decimal

Application Programming Interface REST API Authentication https://api.bittxn.com/api/v1/b2trade/auth [POST] Request params

Add to Reading List

Source URL: dev.bittxn.lazyweb.club.tw

Language: English - Date: 2018-08-01 05:59:46
19

Journal Of Advanced Networking and Applications Vol. 01 No. 01 pages: Enhancing the Authentication of Bank Cheque

Add to Reading List

Source URL: www.ijana.in

Language: English - Date: 2012-05-01 04:26:38
    20

    Version 8.0 Table 1 Publication DateDatabase of Cross-Contaminated or Misidentified Cell Lines International Cell Line Authentication Committee (ICLAC) This database lists cell lines that are known to be cross

    Add to Reading List

    Source URL: iclac.org

    Language: English - Date: 2016-11-30 19:26:03
      UPDATE