Authentication

Results: 7063



#Item
831

Authentication and Authorisation for Research and Collaboration NA2 Subtask update Authentication and Authorisation for Research and Collaboration Peter Gietz, Martin Haase

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2015-11-05 05:22:43
    832

    Context Authentication Using Constrained Channels Tim Kindberg, Kan Zhang Hewlett-Packard Laboratories 1501 Page Mill Road Palo Alto, CA 94304, USA {timothy,kzhang}@hpl.hp.com

    Add to Reading List

    Source URL: www.champignon.net

    Language: English - Date: 2010-02-16 02:32:36
      833

      Directory Cache Directory Calls to Improve Performance The methods of the WAF Directory API are used to implement and manage user authentication functionality in your Wakanda Web applications. But it is important to kn

      Add to Reading List

      Source URL: download.wakanda.org

      Language: English - Date: 2015-12-17 04:19:13
        834

        PPAA: Peer-to-Peer Anonymous Authentication (Extended Version)∗† Patrick P. Tsang‡ and Sean W. Smith§ Department of Computer Science Dartmouth College Hanover, NH 03755

        Add to Reading List

        Source URL: www.ists.dartmouth.edu

        Language: English
          835

          Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing Dan Wendlandt David G. Andersen Adrian Perrig Carnegie Mellon University Abstract

          Add to Reading List

          Source URL: www.cs.cmu.edu

          Language: English - Date: 2008-10-27 17:23:52
            836

            u2f authentication Universal Second Factor Jan-Erik Rediger 20. Mai 2015

            Add to Reading List

            Source URL: fnordig.de

            Language: German - Date: 2015-05-20 10:08:05
              837Computer access control / Access control / Cryptography / Computer security / FIDO Alliance / Authentication / YubiKey / Password / Multi-factor authentication / Hypertext Transfer Protocol / Challengeresponse authentication

              FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-undefined-undefined-psfido-u2f-raw-message-formats-v1.0-undefined-pshtml Prev

              Add to Reading List

              Source URL: fidoalliance.org

              Language: English - Date: 2015-06-29 13:40:34
              838Computing / Computer access control / Identity management / Computer security / Federated identity / Free software / Java enterprise platform / OpenAM / ForgeRock / Toyota / Telematics / Multi-factor authentication

              CASE STUDY: TOYOTA MOTOR EUROPE Toyota Motor Europe Delivers ‘Connected Car’ Experience with ForgeRock OpenAM Satellite navigation systems, smart phones, applications, and online services are rapidly improving the e

              Add to Reading List

              Source URL: www.forgerock.com

              Language: English - Date: 2015-06-10 15:37:06
              839

              Authentication codes Correlation attacks Coding theory as a tool in crypto Thomas Johansson Dept of EIT,

              Add to Reading List

              Source URL: indocrypt09.inria.fr

              Language: English - Date: 2010-01-14 06:48:16
                840

                “They brought in the horrible key ring thing!” Analysing the Usability of Two-Factor Authentication in UK Online Banking Kat Krol, Eleni Philippou, Emiliano De Cristofaro, M. Angela Sasse University College London E-

                Add to Reading List

                Source URL: discovery.ucl.ac.uk

                Language: English - Date: 2015-07-21 04:21:47
                  UPDATE