Authentication

Results: 7063



#Item
201Computer access control / Computer security / Computing / Single sign-on / Multi-factor authentication / Authentication / OAuth / Mobile app / Electronic authentication / Accounts & SSO

PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-07-28 08:23:01
202Government / Forgery / Military-industrial complex / Defense Logistics Agency / Counterfeit / Government procurement in the United States / Economy / Business / Defense Contract Management Agency / Government Accountability Office / Authentication / Counterfeit electronic components

GAO; Counterfeit Parts: DOD Needs to Improve Reporting and Oversight to Reduce Supply Chain Risk

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2016-02-16 12:47:10
203Computer security / Computing / Cryptography / Computer access control / Access control / Password / Security / Cryptographic protocols / Authentication / Digest access authentication / SAP Logon Ticket

C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

Add to Reading List

Source URL: www.extropia.com

Language: English - Date: 2003-08-09 07:16:17
204Employment / Business / Personal life / Supervisor / Anger / Employee relations / Employee assistance program / Extensible Authentication Protocol

BB Frontline Supervisorpub

Add to Reading List

Source URL: gato-docs.its.txstate.edu

Language: English - Date: 2016-08-20 06:33:20
205Software / Computing / System software / Computer access control / Password / Security / Cryptography / Pass / Cryptographic software / Challengeresponse authentication / HTTP cookie / Android

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
206Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: systempay.cyberpluspaiement.com

Language: English - Date: 2015-12-16 04:48:58
207Cryptography / Security / Computer access control / Civil law common law) / Sierre / Authentication / Electronic signature

An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2010-04-14 10:56:00
208Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

How to Configure Identical Credentials Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
209Computer access control / Cryptography / Prevention / Computer security / Password / Citigroup / Login / Authentication

How  to  use  the  UGA  CITI  Login  Portal   Introduction.   All  UGA  faculty,  staff  and  students  who  take  or  desire  to  take  training  on  

Add to Reading List

Source URL: gear.ovpr.uga.edu

Language: English - Date: 2015-05-14 16:52:32
210Computer access control / Access control / Authentication / Notary / Packaging / Mediascape / Law

Instrument: Collaborative Project (STREP) Call Identifier: FP7-ICT2013-10 Grant Agreement: WP3 – CONNECT – MediaScape multi-connection mechanisms and multi-device authentication

Add to Reading List

Source URL: mediascapeproject.eu

Language: English - Date: 2016-06-20 03:18:25
UPDATE