Authentication

Results: 7063



#Item
821

Authentication Critical RFID PrivacyEnhancing Technologies Using RFID technology, people can automatically and remotely identify objects. With the prospects of this technology, however, come many security concerns. The

Add to Reading List

Source URL: ec-wu.at

Language: English - Date: 2014-07-13 07:57:56
    822Public-key cryptography / Public key infrastructure / Key management / Certificate authorities / Computer access control / DigiCert / Public key certificate / Email / Authentication

    Microsoft Word - TCS2015help.docx

    Add to Reading List

    Source URL: certificate.nikhef.nl

    Language: English - Date: 2015-06-23 09:16:47
    823

    YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2015-11-15 19:31:57
      824

      Authentication, Access Control, and Audit RAVI SANDHU George Mason University ^& PIERANGELA SAMARATI Universita` degli Studi di Milano, Milano, Italy ^&

      Add to Reading List

      Source URL: profsandhu.com

      Language: English - Date: 2008-02-07 14:26:24
        825Cryptography / Security / Packaging / Access control / Biometrics / Identification / Surveillance / Authentication / Validation / AU10TIX

        036047_FINAL GID LOGO_1.eps

        Add to Reading List

        Source URL: www.vixverify.com

        Language: English - Date: 2016-03-21 00:35:26
        826Computing / Spamming / Cyberspace / Spam filtering / Email / Email authentication / Confidence tricks / Cybercrime / Phishing / DMARC / DomainKeys Identified Mail / Outlook.com

        AgariBattlecard_EFP Diagram 2

        Add to Reading List

        Source URL: returnpath.com

        Language: English - Date: 2016-04-11 15:00:50
        827

        YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button

        Add to Reading List

        Source URL: www.yubico.com

        Language: English - Date: 2015-11-15 19:31:53
          828

          Access Management Network and System authentication, data/service authorization, password/credential management Physical Security Environmental controls, Control of access to critical facilities, equipment and/or media,

          Add to Reading List

          Source URL: www.vascan.org

          Language: English - Date: 2010-08-17 10:17:16
            829Cryptography / Prevention / Computer access control / Security / Access control / Authentication / Notary / Packaging / Password / Questionnaire / Job interview / Cognitive password

            Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2016-02-21 12:56:55
            830

            Principles of Authentication Ed Talbot UC Davis California, USA

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English
              UPDATE