Authentication

Results: 7063



#Item
531Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
532Internet Standards / Internet protocols / Short Message Service / Text messaging / Transmission Control Protocol / Cryptographic protocols / Network protocols / Simple Authentication and Security Layer

Apache Avro# 1.8.1 SASL Profile Table of contents 1 Introduction........................................................................................................................2

Add to Reading List

Source URL: avro.apache.org

Language: English - Date: 2016-05-21 18:02:26
533Certificate authorities / Computer access control / IdenTrust / Authentication / ING Group / Bank / EBAM

IdenTrust™ Electronic Account Management Streamlining Processes & Reducing Costs for Global Corporations Account Opening and Maintenance Made Easy

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:45
534Payment systems / E-commerce / Online banking / Computer access control / Cheque / Security token / Transaction authentication number / Internet fraud / Alternative payments / Giropay

Reference Guide – Business Online Banking Welcome to safer internet banking As online fraud becomes increasingly sophisticated our security measures need to advance to combat these crimes.

Add to Reading List

Source URL: www.co-operativebank.co.uk

Language: English - Date: 2014-07-01 05:27:35
535Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Public key certificate / Certificate authority / Revocation list / X.509 / Certification Practice Statement / Energy Sciences Network / Authentication

DOE Grids Certificate Policy And Certification Practice Statement Version 2.3

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2004-03-19 16:52:58
536EMC Corporation / E-commerce / Identity theft / Crimes / Deception / RSA Security / RSA / Fraud / Internet fraud / Authentication / Computer security

RSA eFraudNetwork Proactive Fraud Protection ® TM

Add to Reading List

Source URL: www.ndm.net

Language: English - Date: 2013-09-30 12:31:49
537Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
538Biometrics / Surveillance / Private biometrics / Security / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
539Internet protocols / Internet Standards / Directory services / RADIUS / Operating system / Password Authentication Protocol / Web server / NetIQ eDirectory

For Windows, Linux, Solaris & FreeBSD VersionAdministrative & Support Office P.O. BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2012-01-09 00:06:05
540Biometrics / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy / Internet privacy / Authentication / Fingerprint Verification Competition

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2011-02-20 12:09:41
UPDATE