Authentication

Results: 7063



#Item
341Cryptography / Key management / Public-key cryptography / Public key infrastructure / Transport Layer Security / Certificate authority / Certificate policy / Public key certificate / IdenTrust / Certification Practice Statement / X.509 / Authentication

IdenTrust Identity Certificate Policy [IP-ICP], Version 3.1a IDENTITY CERTIFICATE POLICY [IP-ICP] Operating Rules and System Documentation Release 3.1a

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
342Human communication / Workplace / Interpersonal communication / Extensible Authentication Protocol / Professional studies

November 2013 Newsletter Five Things You Should Never Say at Work! There are certain statements that are considered toxic in the workplace, according to Barbara

Add to Reading List

Source URL: www.theeap.com

Language: English - Date: 2015-04-20 22:13:08
343Computer access control / Cryptography / Computer security / Prevention / Password / Security / Login / Authentication / Password strength / Password notification email

Getting started with the ECDC Map Maker - EMMa This guide explains how you get access to EMMa as a new user. It consists of three sections:  Registering as a user – describes how to set yourself up as an EMMa user.

Add to Reading List

Source URL: emma.ecdc.europa.eu

Language: English - Date: 2015-05-18 03:47:48
344Computer access control / Computer security / Access control / Security / Multi-factor authentication / Password / Authentication / Security token / RSA SecurID / Phishing / Electronic authentication

Microsoft PowerPoint - OConnor_RoleOfLocationInCybersecurity_Final.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2013-11-20 20:27:34
345Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
346Security / Eye / Prevention / Surveillance / Biometrics / Vision / Cognitive science / Authentication / Eye tracking / Eye movement / Facial recognition system / Password

1 Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics SIMON EBERZ and KASPER B. RASMUSSEN, University of Oxford VINCENT LENDERS, Armasuisse

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-08-02 08:48:19
347Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / X.509 / Certification Practice Statement / Authentication

DOE Grids CA Certificate Policy and Certification Practice Statement

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2008-09-03 15:39:00
348Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
349Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English
350Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
UPDATE