Authentication

Results: 7063



#Item
791

A digital technique for art authentication Siwei Lyu*, Daniel Rockmore*†, and Hany Farid*‡ Departments of *Computer Science and †Mathematics, Dartmouth College, Hanover, NHCommunicated by David L. Donoho, St

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2008-09-11 13:37:50
    792

    Authentication and Apostille Certificate Order Form

    Add to Reading List

    Source URL: www.sos.state.wi.us

    Language: English - Date: 2015-08-24 13:24:22
      793Computer access control / Computer security / Cryptography / Access control / FIDO Alliance / Authentication / Strong authentication / Multi-factor authentication / Universal 2nd Factor / Fido Solutions / Password / Security token

      Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

      Add to Reading List

      Source URL: fidoalliance.org

      Language: English - Date: 2016-02-05 15:46:07
      794Cryptography / Crypto-anarchism / Internet privacy / Mix network / Secure communication / Ciphertext indistinguishability / Message authentication code

      Sphinx: A Compact and Provably Secure Mix Format George Danezis Ian Goldberg Microsoft Research,

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:48:59
      795

      EC-SPEKE Authentication Mechanism for AllJoyn Greg Zaverucha () June 23, 2015 This document describes the design of a new authentication method for AllJoyn, called ECDHE_SPEKE. The method uses a passwo

      Add to Reading List

      Source URL: wiki.allseenalliance.org

      Language: English
        796

        FACIAL MOVEMENT BASED PERSON AUTHENTICATION Pengqing Xie Yang Liu (Presenter) Yong Guan

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2014-07-24 06:12:27
          797

          Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna UC Santa Barbara {yans,fish,christophe,c

          Add to Reading List

          Source URL: www.lastline.com

          Language: English - Date: 2015-08-26 13:52:29
            798Public key infrastructure / Public-key cryptography / Secure communication / Email encryption / Authentication / Transport Layer Security / Dynamic SSL

            My Locker, Your Locker, Our Locker – How to Manage Keys and Certificates Pankaj Kumar Session Objectives

            Add to Reading List

            Source URL: pankaj-k.net

            Language: English - Date: 2007-02-02 01:42:32
            799Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

            Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

            Add to Reading List

            Source URL: www.mitls.org

            Language: English - Date: 2016-01-06 07:34:05
            800

            Authentication and Authenticated Key Exchanges 1 Whitfield Diffie2 Sun Microsystems, 2550 Garcia Ave., Mountain View, CAUSA

            Add to Reading List

            Source URL: people.scs.carleton.ca

            Language: English - Date: 2001-09-18 05:27:05
              UPDATE