Authentication

Results: 7063



#Item
771Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
772

Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Version CHAPTER 24 SMALL AND MEDIUM-SIZED ENTERPRISES

Add to Reading List

Source URL: itsourfuture.org.nz

Language: English
    773

    Smart Card (PKI) Authentication into the Database It is time to reevaluate your authentication strategy.

    Add to Reading List

    Source URL: www.eastcoastoracle.org

    Language: English - Date: 2016-03-16 18:00:52
      774Interoperability / Product testing / Telecommunications engineering

      Authentication and Authorisation for Research and Collaboration Authentication and Authorisation for Research and Collaboration Where are we at.

      Add to Reading List

      Source URL: aarc-project.eu

      Language: English - Date: 2016-05-06 09:13:29
      775Email authentication / Spam filtering / Computing / Social engineering / Cybercrime / Internet / Network architecture / Spamming / Phishing / DMARC / DomainKeys Identified Mail

      LostPass Pixel-perfect LastPass Phishing ShmooConSean Cassidy

      Add to Reading List

      Source URL: raw.githubusercontent.com

      Language: English
      776Computing / Wireless / Technology / Bluetooth / Universal 2nd Factor / FIDO Alliance / Near field communication / Authentication / Authenticator

      Bluetooth & NFC Transport for FIDO U2F July 22, 2015 Executive Summary Universal 2nd Factor (U2F) is a Fast IDentity Online (FIDO) Alliance protocol that lets online applications and services augment the security of the

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2015-08-04 16:08:10
      777Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

      The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:14
      778Cryptography / Security / Computer security / Computer access control / Authenticator / Nok Nok Labs / Authentication / FIDO Alliance / Fido

      FIDO UAF Authenticator-Specific Module API FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-asm-api-v1.0pshtml Previous versio

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2015-03-30 14:07:07
      779Computing / Spamming / Cyberspace / Spam filtering / Email / Email authentication / Cybercrime / Webmail / DMARC / Email spam / Outlook.com / Gmail

      REPUTATION INFORMANT The most comprehensive tool for email reputation monitoring Over 25M domains monitored for spam trap hits.

      Add to Reading List

      Source URL: 250ok.com

      Language: English - Date: 2016-01-27 15:34:15
      780Computer security / Computer access control / Security / Prevention / Authentication / Multi-factor authentication / Identity theft / Money laundering / Security token / Information security / Internet security / Identity management

      Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

      Add to Reading List

      Source URL: www.identrust.com

      Language: English - Date: 2012-07-10 20:41:42
      UPDATE