Authentication

Results: 7063



#Item
281Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
282Security / Prevention / Safety / Cryptography / Computer security / E-commerce / Computer access control / Payment Card Industry Data Security Standard / Data security / Payment card / Multi-factor authentication / Information security

Mapping ISO27001 <> PCI-DSS 2.0

Add to Reading List

Source URL: www.forinsect.com

Language: English - Date: 2011-08-26 04:51:29
283Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
284Survey methodology / Genealogy / Demography / Authentication / Computer access control / Notary / Packaging / Census / Questionnaire / Human geography / Usability / Security

Statistics Portugal – Census Unit Anabela Delgado _ Carlota Amorim _ SESSION 3 n#3

Add to Reading List

Source URL: www.simply2010.be

Language: English - Date: 2010-11-30 06:34:37
285Computer access control / Computer security / Access control / Identity management / Password / Security / Multi-factor authentication / Authentication / Password strength / Password manager

THE FACTS: PASSWORDS & SECURING YOUR ACCOUNTS Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords. How do I create a good password?

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
286Computer access control / Security / Computer security / CAPTCHA / Transaction authentication number / Authentication / Challengeresponse authentication / Multi-factor authentication / Internet bot / Turing test / Form

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:41:31
287Cryptography / Message authentication codes / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Digital Signature Algorithm / FIPS 140-2 / Dual EC DRBG / OpenSSL / SHA-2 / Hash-based message authentication code

FIPSNon-proprietary Security Policy Cohesity OpenSSL FIPS Object Module VersionBy Cohesity, Inc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-05-26 13:27:36
288Computer access control / Security / Computer security / Prevention / Multi-factor authentication / Authentication / Security token / ESET / Information security / Access control / Electronic authentication / Strong authentication

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
289Computer access control / Computer security / Identity management / Federated identity / Shibboleth / IDM / Security Assertion Markup Language / Authentication

Report Market Analysis of IdM Solutions for Swiss edu-ID Name Surname Job Title Document Type:

Add to Reading List

Source URL: projects.switch.ch

Language: English - Date: 2016-07-14 11:47:46
290Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
UPDATE