Authentication

Results: 7063



#Item
21Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Add to Reading List

Source URL: nebelwelt.net

Language: English - Date: 2018-08-13 04:44:10
    22Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig  

    Proceedings of the Internet Society Network and Distributed System Security Symposium (NDSS 2001), February 2001, ppEfficient and Secure Source Authentication for Multicast Adrian Perrig 

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2008-10-12 11:59:02
      23Overview of GPO’s Authentication Program For more than 150 years, the core mission of the U.S. Government Printing Office (GPO), Keeping American Informed, has remained unchanged. Since 1861 users have looked to GPO as

      Overview of GPO’s Authentication Program For more than 150 years, the core mission of the U.S. Government Printing Office (GPO), Keeping American Informed, has remained unchanged. Since 1861 users have looked to GPO as

      Add to Reading List

      Source URL: www.govinfo.gov

      Language: English - Date: 2018-06-28 12:42:00
        24Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt Florian Alt, Heinrich Hussmann LM

        Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality Ceenu George, Mohamed Khamis, Emanuel von Zezschwitz, Marinus Burger, Henri Schmidt Florian Alt, Heinrich Hussmann LM

        Add to Reading List

        Source URL: www.medien.ifi.lmu.de

        Language: English - Date: 2017-03-09 09:08:27
          25Capital Reporting Company Document Authentication WorkshopUNITED STATES GOVERNMENT PRINTING OFFICE

          Capital Reporting Company Document Authentication WorkshopUNITED STATES GOVERNMENT PRINTING OFFICE

          Add to Reading List

          Source URL: www.govinfo.gov

          Language: English - Date: 2018-06-28 12:42:00
            26Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication Cas Cremers, Marko Horvat Sam Scott, Thyla van der Merwe

            Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication Cas Cremers, Marko Horvat Sam Scott, Thyla van der Merwe

            Add to Reading List

            Source URL: www.cs.ox.ac.uk

            Language: English - Date: 2018-05-10 10:32:16
              27Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild, Kevin Milner Department of Computer Science, University of Oxford. {cas.cremers,martin.dehnel-wild,kevin.milner}@cs.ox.a

              Secure Authentication in the Grid: A formal analysis of DNP3: SAv5 Cas Cremers, Martin Dehnel-Wild, Kevin Milner Department of Computer Science, University of Oxford. {cas.cremers,martin.dehnel-wild,kevin.milner}@cs.ox.a

              Add to Reading List

              Source URL: www.cs.ox.ac.uk

              Language: English - Date: 2017-06-22 17:04:38
                28SecurPassword Tokenless two-factor authentication to enable self-service password reset. No more helpdesk calls! SecurPassword allows users to leverage their existing

                SecurPassword Tokenless two-factor authentication to enable self-service password reset. No more helpdesk calls! SecurPassword allows users to leverage their existing

                Add to Reading List

                Source URL: www.securenvoy.es

                Language: English - Date: 2013-06-18 07:53:50
                  29Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe†, Lorrie Faith Cranor, Marios Savvides Carnegie Mellon

                  Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption Chandrasekhar Bhagavatula, Blase Ur, Kevin Iacovino, Su Mon Kywe†, Lorrie Faith Cranor, Marios Savvides Carnegie Mellon

                  Add to Reading List

                  Source URL: www.blaseur.com

                  Language: English - Date: 2017-08-21 01:40:29
                    30Demo of BANDANA - Body Area Network Device-to-device Authentication using Natural gAit Ngu Nguyen† , C¸a˘glar Y¨uce Kaya∗ , Arne Br¨usch∗ , Dominik Sch¨urmann∗ , Stephan Sigg† , Lars Wolf∗ ∗ Technische

                    Demo of BANDANA - Body Area Network Device-to-device Authentication using Natural gAit Ngu Nguyen† , C¸a˘glar Y¨uce Kaya∗ , Arne Br¨usch∗ , Dominik Sch¨urmann∗ , Stephan Sigg† , Lars Wolf∗ ∗ Technische

                    Add to Reading List

                    Source URL: www.ibr.cs.tu-bs.de

                    Language: English - Date: 2018-04-03 09:38:40