Authentication

Results: 7063



#Item
561Computer access control / Computer network security / Virtual private networks / ESET / Internet privacy / Network architecture / Multi-factor authentication / Password / Authentication / One-time password / RADIUS / SoftEther VPN

Protect your VPN in 10 Minutes Looking to secure your VPN access in no time? ESET Secure Authentication gives your people super easy, secure access to your company network - from anywhere. Run The Installer ◆ Run the

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-19 03:58:22
562Automatic identification and data capture / Radio-frequency identification / Logistics / Supply chain management / Ubiquitous computing / Track and trace / EPCIS / EPCglobal Network / Authentication / Object Naming Service / Epedigree / SAP Auto-ID Infrastructure

Building Radio frequency IDentification for the Global Environment White Paper RFID Tag Security Authors: Manfred Aigner (TU Graz), Trevor Burbridge (BT

Add to Reading List

Source URL: bridge-project.eu

Language: English - Date: 2012-01-25 04:55:54
563Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
564Identity documents / Identity theft / Red Flags Rule / Fair and Accurate Credit Transactions Act / Authentication / Social Security number / Cheque / Personally identifiable information / Computer security / United States v. Clark / Identity score

Microsoft WordDOC

Add to Reading List

Source URL: policies.unc.edu

Language: English - Date: 2013-04-30 11:50:18
565Public-key cryptography / Cryptographic software / Cryptographic hash functions / Key management / Cryptography standards / Hardware security module / Microsoft CryptoAPI / RSA / PKCS / SHA-1 / Hash-based message authentication code / Digital signature

LYNKS Series II Authentication HSM TM High-Assurance Hardware Security Module Specifically Designed for Authentication Applications

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2015-08-05 12:42:41
566

Arista Networks Legal Request 13 April 15 This request is being made on behalf of Arista Networks Inc. by Michael J. Ballanco with the law form of Fish & Richardson P.C. for authentication of RFCs 792 and 2661for an inte

Add to Reading List

Source URL: iaoc.ietf.org

- Date: 2015-07-22 07:38:27
    567Computer access control / Password / Multi-factor authentication / Authentication

    GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices Mohamed Khamis1 , Florian Alt1 , Mariam Hassib1,2 , Emanuel von Zezschwitz1 , Regina Hasholzner1 , Andreas Bulling3 1

    Add to Reading List

    Source URL: www.medien.ifi.lmu.de

    Language: English - Date: 2016-02-13 07:07:53
    568Standardized tests / Data security / Crime prevention / Cryptography / National security / Certified Information Systems Security Professional / DSST / Denver School of Science and Technology / Authentication / CompTIA / Professional certification / Computer security

    DSST EXAM CONTENT FACT SHEET DSST® FUNDAMENTALS OF CYBERSECURITY EXAM INFORMATION This examination includes content related to major topics in cybersecurity including application and systems

    Add to Reading List

    Source URL: getcollegecredit.com

    Language: English - Date: 2016-04-18 11:11:45
    569Model checkers / Theoretical computer science / Crime prevention / Cryptography / National security / Model checking / NuSMV / Formal methods / Common Criteria / Temporal logic / Computer security / Authentication

    NXP PowerPoint template Guidelines for presentations

    Add to Reading List

    Source URL: www.yourcreativesolutions.nl

    Language: English - Date: 2011-09-09 16:28:00
    570Spam filtering / Email authentication / Spamming / DMARC / Phishing / Email / Draft:Agari

    DMARC A first year enabling trust between brand owners and receivers February 2013

    Add to Reading List

    Source URL: dmarc.org

    Language: English - Date: 2013-02-06 14:26:10
    UPDATE