Authentication

Results: 7063



#Item
391Cryptography / Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Public-key cryptography / Authentication / Tag / RSA

Proceedings - NN - Data Synchronization in Privacy-Preserving RFID Authentication Schemes?

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:33:27
392Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
393Security / Computer access control / Computing / Cryptography / Access control / Authentication / Authorization / SOAP / Kerberos

An authorization control framework to enable service composition across domains Takashi Suzuki University of California, Berkeley Berkeley, CA

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2002-02-14 23:42:26
394Law / Civil procedure / Water law / Water right / Adjudication / Authentication / Common law

GUIDELINES FOR DOCUMENTING RIGHTS NOT OF RECORD IN A GENERAL ADJUDICATION In a water rights general adjudication, a claimant wishing to file a water user’s claim for a water right not already on the records of the Stat

Add to Reading List

Source URL: waterrights.utah.gov

Language: English - Date: 2016-05-24 18:46:12
395Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
396Password / Security

Proceedings - NN - Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:31:39
397Economy / Information privacy / Business / Payment cards / E-commerce / Computing / Payment systems / Computer law / Payment Card Industry Data Security Standard / PA-DSS / Conventional PCI / Multi-factor authentication

Payment Card Industry (PCI) Data Security Standard Summary of Changes from PCI DSS Version 2.0 to 3.0

Add to Reading List

Source URL: www.pcidss.ru

Language: English - Date: 2014-02-27 15:53:19
398Computer access control / Cryptography / Obfuscation / Password / Security / Challengeresponse authentication / Crypt / Microsoft Word / Draw a Secret / Password cracking

Microsoft Word - 29_Paper.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
399Notary / Law / Common law / Comparative law / Notary public / Certified copy / United States Postal Service / Birth certificate / Authentication / Act / Legal instrument / Consularization

Authentication/ Acknowledgement Any legal document issued in the U.S. must first be acknowledged or authenticated (‘consularized’) by the Philippine Embassy/Consulate General in order for that document to have any le

Add to Reading List

Source URL: www.philippinessanfrancisco.org

Language: English - Date: 2016-06-03 18:23:53
400Computer access control / Access control / Authentication / Notary / Packaging / Usability / Computer security / Security / Universal Plug and Play

Threshold Things That Think: Usable Authorisation for Resharing [Poster Abstract SOUPS.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:02:05
UPDATE