Authentication

Results: 7063



#Item
591Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
592Computer access control / Identity management systems / Federated identity / Identity management / OpenAthens / Authentication / Single sign-on / Security Assertion Markup Language / Athens / Web portal

OpenAthens for Education “OpenAthens ease of use and flexibility has been invaluable to Aston University in enabling us

Add to Reading List

Source URL: www.openathens.org

Language: English - Date: 2016-04-29 09:36:54
593Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
594Information privacy / Payment cards / E-commerce / Computer law / Payment Card Industry Data Security Standard / Payment systems / Payment Card Industry Security Standards Council / Payment card industry / Conventional PCI / PA-DSS / DSS / Multi-factor authentication

PCI DSS 3.2 Resource Guide The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during and after purcha

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-04-28 11:41:13
595Routing / Internet Standards / Internet protocols / IP addresses / Internet Routing Registry / Routing Policy Specification Language / Border Gateway Protocol / Classless Inter-Domain Routing / Autonomous system / Authentication / WHOIS / Router

Network Working Group Request for Comments: 2725 Category: Standards Track C. Villamizar Avici

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:35:48
596Computer access control / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / Single sign-on / Identity provider / XACML / Authentication / Security token / WS-Security / SAML 2.0

Deliverable No. 3.4 Service Integration Guidelines Grant Agreement No.: 270089

Add to Reading List

Source URL: p-medicine.eu

Language: English - Date: 2013-08-09 04:11:23
597Signature / Cryptography standards / Public-key cryptography / E-commerce / Computer law / Public key certificate / Authentication / Electronic signature / FIPS 140-2 / Digital signature / Qualified electronic signature / RSA SecurID

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-07-09 04:32:36
598Computer access control / Certificate authorities / Public key infrastructure / Public-key cryptography / Transport Layer Security / IdenTrust / Authentication / Know your customer

Electronic Account Mgmt_State Treasurer Article 5.ai

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
599Liquor Control Board of Ontario / Computer access control / Password / Email / Authentication

Application Form for Access to In-Store Experience Programs System

Add to Reading List

Source URL: www.doingbusinesswithlcbo.com

Language: English - Date: 2015-04-01 13:57:17
600Standardized tests / Education in England / English law / Proctor / Authentication / Test / Exam

           

Add to Reading List

Source URL: vcc.mst.edu

Language: English - Date: 2016-08-18 06:01:14
UPDATE