Authentication

Results: 7063



#Item
541Text messaging / Computer access control / Social networking services / Short Message Service / Authentication / Password / Google Search / Facebook / Internet privacy

Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study Yusuf Albayram Mohammad Maifi Hasan Khan

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:57
542Computer network security / Sqrrl / Computer security / Crime prevention / Cryptography / National security / Threat / Authentication / Hunting / Carbon Black

Threat Hunting from Network to Endpoint July 2016 | Target. Hunt. Disrupt. Presenters Jim Raine

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2016-07-21 11:15:01
543Signature / Public-key cryptography / Cryptography standards / Computer law / Key management / Public key certificate / Authentication / Digital signature / Electronic signature / Qualified electronic signature / RSA SecurID / FIPS 140-2

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-02-05 10:51:00
544Signature / Public-key cryptography / Notary / Public key infrastructure / Key management / Authentication / RSA SecurID / Public key certificate / Password / EIDAS / Digital signature / Electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-05-17 09:49:57
545Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Certificate policy / Certificate authority / Public key certificate / Revocation list / Certification Practice Statement / X.509 / Authentication

Microsoft Word - CPS-3.0.doc

Add to Reading List

Source URL: www.doegrids.org

Language: English - Date: 2009-03-06 19:20:12
546Computer access control / Password / Security token / Phishing / Authentication / Challengeresponse authentication / Self-service password reset / Multi-factor authentication

Educated Guess on Graphical Authentication Schemes: Vulnerabilities and Countermeasures Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:07:47
547Computer access control / Java platform / Archive formats / Log file / JAR / Authentication / Cloud computing security / Logger / Data logger / Login / Oracle Database / Log4j

Promoting Distributed Accountability in the Cloud

Add to Reading List

Source URL: cs.mst.edu

Language: English - Date: 2015-04-03 16:07:48
548Computer access control / EMC Corporation / Access control / Computer security / Software distribution / RSA Security / RSA SecurID / Multi-factor authentication / Identity management / Single sign-on / Cloud computing / Provisioning

RSA Via Solution Overview

Add to Reading List

Source URL: www.rsa.com

Language: English - Date: 2016-03-14 08:22:34
549Biometrics / Identification / Surveillance / Aadhaar / Authentication / Draft:Aadhaar

Biometric Attendance Authentication System (Nodal Office User Manual) 1. Dashboard 1.1 Organization: Total Organization registered in the system with their details. 1.2 Registered Employees: Organization wise Registered

Add to Reading List

Source URL: surveyofindia.attendance.gov.in

Language: English - Date: 2015-02-20 06:42:12
550Computer networking / Hop / Ingress router / Packet switching / Router / Transmission Control Protocol / Communications protocol / Firewall / NetFlow / Forwarding plane

Lightweight Source Authentication and Path Validation Tiffany Hyun-Jin Kim Cristina Basescu Limin Jia

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
UPDATE