Authentication

Results: 7063



#Item
321Security / Computer security / Computer access control / Access control / Identity management / Perimeter security / PERMIS / Trust management / Authentication / Authorization

The Role of Trust Management in Distributed Systems Security Matt Blaze1 , Joan Feigenbaum1 , John Ioannidis1 , and Angelos D. Keromytis2 1 AT&T Labs - Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:48:32
322Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
323Cryptography / Public-key cryptography / Key management / Konrad Zuse / Mechanical computers / Elliptic curve cryptography / Radio-frequency identification / Key / Z2 / Z1 / Digital signature

Proceedings - NN - A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:43:24
324Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
325Computer access control / Cryptography / Humancomputer interaction / Technical communication / Usability / Authentication / Computer security / Security

SOUPSPersonal Choice and Challenge Questions: A Security and Usability Assessment 16 July 2009

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-16 14:02:05
326Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
327Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
328Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
329Cryptography / Security / Idiap Research Institute / Martigny / Surveillance / Civil law common law) / Biometrics / BioWatch / CSEM / Authentication / Neuchtel

Microsoft Word - CP16-Biowave_EN_pdfversion

Add to Reading List

Source URL: www.biowatch.ch

Language: English - Date: 2016-02-05 11:08:35
330Computer access control / Computer security / Federated identity / Identity management / Single sign-on / Password / IceWall SSO / Usability of web authentication systems

SINGLE SIGN ON (SSO) SUPPORT FOR JOIN.ME AUTHENTICATION At join.me, we consider the security of our users a top priority. We integrate with a number of SSO platforms to maintain a highly secure environment without added

Add to Reading List

Source URL: az766929.vo.msecnd.net

Language: English - Date: 2016-06-20 09:36:34
UPDATE