Authentication

Results: 7063



#Item
691Computer security / Computer access control / Security / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Internet advertising / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following:   

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2014-09-25 08:27:41
692

Improving Multi-Tier Security ∗ Using Redundant Authentication Jodie P. Boyer Nikita Borisov†

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-03-29 11:59:12
    693

    Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 6 TRADE REMEDIES

    Add to Reading List

    Source URL: itsourfuture.org.nz

    Language: English
      694

      OK: OAuth 2.0 interface for the Kerberos V5 Authentication Protocol James Max Kanter Bennett Cyphers Bruno Faviero

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
        695Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

        Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

        Add to Reading List

        Source URL: mitls.org

        Language: English - Date: 2016-01-06 07:34:05
        696Computer access control / Federated identity / Identity management / OpenID / OAuth / Security Assertion Markup Language / Authentication / Digital identity / Identity provider / WebID / Information Card / Shibboleth

        A Comparative Analysis of Identity Standards for the Internet Master Thesis Kaspar Etter

        Add to Reading List

        Source URL: www.digitalid.net

        Language: English - Date: 2014-05-23 10:03:12
        697

        Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 5

        Add to Reading List

        Source URL: itsourfuture.org.nz

        Language: English
          698Identity management / Computer access control / Computer security / Law / Privacy / Internet privacy / Cryptography / Authentication / Security

          PRIVACY IMPACT ASSESSMENTS FOR IGOVT PROGRAMME For: The Department of Internal Affairs (NZ)

          Add to Reading List

          Source URL: www.realme.govt.nz

          Language: English - Date: 2015-05-13 01:43:40
          699Cryptography / Public key infrastructure / Public-key cryptography / Key management / Cryptographic protocols / Transport Layer Security / Public key certificate / X.509 / DocuSign / Online Certificate Status Protocol / SCVP / Authentication

              DocuSign  Confidential    

          Add to Reading List

          Source URL: certificates.docusign.com

          Language: English - Date: 2014-02-20 15:11:45
          700Computer access control / Security token / Authentication / Token / Access token / Contract

          TOKEN REQUEST FORM Diamond Bank Plc. RCCustomer Information Type of Account

          Add to Reading List

          Source URL: www.diamondbank.com

          Language: English - Date: 2016-05-26 13:33:00
          UPDATE