Authentication

Results: 7063



#Item
681

DRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, p

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-11-19 14:25:16
    682

    Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 17 STATE-OWNED ENTERPRISES AND DESIGNATED MONOPOLIES

    Add to Reading List

    Source URL: itsourfuture.org.nz

    Language: English
      683

      TECHNOLOGY OFFER - IDENTIFICATION OF REAL FINGERPRINTS System and method for identification of real fingerprints The human fingerprint is unique and a typical biometric authentication method. However, the identification

      Add to Reading List

      Source URL: spva.de

      Language: English - Date: 2013-02-01 07:36:40
        684

        SafeNet Authentication Client 8.0 (SAC) Uživatelská p íru ka Poslední verze ze dne

        Add to Reading List

        Source URL: www.cacgroup.cz

        Language: Czech - Date: 2015-02-23 15:15:22
          685Computer access control / Computer security / Computing / World Wide Web / Human-based computation / Hacking / Social engineering / Spamming / CAPTCHA / Internet bot / Cross-site request forgery / Transaction authentication number

          Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

          Add to Reading List

          Source URL: www2016.net

          Language: English - Date: 2016-04-10 09:10:41
          686

          1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

          Add to Reading List

          Source URL: www.mitls.org

          Language: English
            687Cryptography / Computing / Cryptographic protocols / Juniper Networks / Pseudorandom number generators / Cryptographic nonce / Internet protocols / NetScreen Technologies / Challengeresponse authentication / ScreenOS / Internet Key Exchange / DiffieHellman key exchange

            A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway*, Shaanan Cohney†, Christina Garman‡, Matthew Green‡, Nadia Heninger†, Jacob Maskiewicz§, Eric Rescorla§, Hovav Shacham§, Ralf-Philipp We

            Add to Reading List

            Source URL: dualec.org

            Language: English - Date: 2016-04-15 12:48:33
            688Computer access control / Computing / Computer security / Cloud standards / Federated identity / OpenID / Identity management / OAuth / FIDO Alliance / Authentication / SAML-based products and services / User-Managed Access

            1) Working Group Name Enhanced Authentication Profile (EAP) for OpenID Connect 2) Purpose The purpose of this working group is to develop a security and privacy profile of the OpenID Connect specifications that enable us

            Add to Reading List

            Source URL: openid.net

            Language: English - Date: 2016-03-06 14:14:42
            689

            Mẫu LS/HPH-2012/TK Form LS/HPH-2012/TK TỜ KHAI CHỨNG NHẬN/ HỢP PHÁP HOÁ LÃNH SỰ Application for consular authentication 1. Họ và tên người nộp hồ sơ: . . . . . . . . . . . . . . . . . . . . . .

            Add to Reading List

            Source URL: www.visum.de

            Language: Vietnamese - Date: 2016-04-12 08:25:10
              690

              I. WEBSITE REGISTRATION To register, go to http://iasp2016moscow.ru/. Click on Sign in to open the authentication form. If you want to create a new account, click on Register

              Add to Reading List

              Source URL: iasp2016moscow.ru

              Language: English - Date: 2016-04-20 07:24:35
                UPDATE