Authentication

Results: 7063



#Item
621Computer access control / Radio electronics / Wireless / Radio-frequency identification / Automotive accessories / Authentication / Challengeresponse authentication / Remote keyless system / Keychain / Transponder / Distance-bounding protocol

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
622Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
623Spamming / Spam filtering / Email / Internet governance / Anti-spam techniques / Sender Policy Framework / Sender ID / Gmail / Email marketing

beyond_authentication.indd

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2016-04-26 15:59:23
624Meat industry / Animal killing / Computer access control / Animal rights / Animals in Islam / Authentication / Slaughterhouse / Email / Halal / Stunning / Animal slaughter

Producer Assurance with box [Converted]

Add to Reading List

Source URL: www.mlcsl.co.uk

Language: English - Date: 2016-03-08 06:37:46
625Computer access control / CAPTCHA / Computer security / Computer vision / Password / Spyware / Challengeresponse authentication / Transaction authentication number / Password strength / Password cracking

Microsoft Word - soups2009-poster-abstract-template.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-15 07:10:07
626Spam filtering / Email authentication / Spamming / Internet governance / Internet protocols / DMARC / DomainKeys Identified Mail / Phishing / Email / Draft:Agari / Sender Policy Framework

DMARC Providing domain owners control of their brand in the email channel January 2012 DMARC Defined

Add to Reading List

Source URL: dmarc.org

Language: English - Date: 2013-11-07 14:27:51
627Email authentication / Spam filtering / Cryptographic protocols / Email / Spamming / DomainKeys Identified Mail / Vouch by Reference / Authentication / Simple Mail Transfer Protocol

Pilot project proposal: AffiL Affiliated domain names for email trust http://mipassoc.org/affil

Add to Reading List

Source URL: www.mipassoc.org

Language: English - Date: 2009-04-28 10:27:57
628Computer access control / Login / Password / Form / Pubcookie / Java Authentication and Authorization Service

2 Login Page This webpage is the default location when one browses to PMTS at http://projectmanagement.ltrc.lsu.edu/ 2.1 Login Area The blue background area of this page is where a user enters their login and password

Add to Reading List

Source URL: projectmanagement.ltrc.lsu.edu

Language: English - Date: 2016-02-12 14:08:30
629Computer network security / Authentication protocols / BitLocker / Disk encryption / Windows 7 / Windows Server / Password / Kerberos

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
630Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
UPDATE