Authentication

Results: 7063



#Item
741

Designing Usable, Yet Secure User Authentication Service: The Cognitive Dimension Christina Braza, Pierre Porriera, and Ahmed Seffahb a

Add to Reading List

Source URL: 3ws1wk1wkqsk36zmd6ocne81.wpengine.netdna-cdn.com

Language: English - Date: 2013-02-08 01:09:47
    742Computer access control / Access control / Prevention / Computer security / Password / Login / Transaction authentication number

    Maryland Campaign Reporting Information System (MD CRIS)

    Add to Reading List

    Source URL: campaignfinancemd.us

    Language: English - Date: 2011-12-18 20:40:23
    743Archaeology / Humanities / Pottery / Sherd / Odyssey Marine Exploration / Ceramic petrography / Archaeological science / Assemblage / Ceramic

    VOLUME 37 NUMBER 4 WINTER 2014 ANALYSIS, ANTIQUITIES AND AUTHENTICATION Scientific analysis is commonly used in the authentication

    Add to Reading List

    Source URL: socarchsci.org

    Language: English - Date: 2014-11-17 13:24:47
    744Software / Cryptographic software / Computer security / Computer access control / Google Chrome extensions / Mozilla add-ons / Dashlane / Cryptography / Password / Salt / OpenSSL / Multi-factor authentication

    Dashlane Security White Paper v2.8 Dashlane Security Whitepaper March 2016 1. General Security Principles a. Protection of User Data in Dashlane

    Add to Reading List

    Source URL: www.dashlane.com

    Language: English - Date: 2016-03-23 12:49:58
    745Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

    Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 22:04:37
    746

    Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 18 INTELLECTUAL PROPERTY

    Add to Reading List

    Source URL: itsourfuture.org.nz

    Language: English
      747Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

      EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

      Add to Reading List

      Source URL: www.ebf-fbe.eu

      Language: English - Date: 2016-02-10 08:34:16
      748Computing / Cryptography / Internet / Secure communication / Cryptographic protocols / Internet protocols / Transport Layer Security / Hypertext Transfer Protocol / HTTPS / HTTP Strict Transport Security / OpenSSL / TLS-PSK

      1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

      Add to Reading List

      Source URL: mitls.org

      Language: English
      749

      On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards Marian Harbach1 , Sascha Fahl1 , Matthias Rieger2 , and Matthew Smith1 1

      Add to Reading List

      Source URL: freehaven.net

      Language: English - Date: 2013-05-06 18:02:11
        750

        Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 12 TEMPORARY ENTRY FOR BUSINESS PERSONS

        Add to Reading List

        Source URL: itsourfuture.org.nz

        Language: English
          UPDATE