Authentication

Results: 7063



#Item
841Computer security / Security / Cryptography / Identity management / Computer access control / IAM / Authentication / Biometrics

INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors

Add to Reading List

Source URL: meetings.internet2.edu

Language: English - Date: 2014-11-06 16:31:04
842

1 Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Karthikeyan Bhargavan∗ , Antoine Delignat-Lavaud∗ , C´edric Fournet† , Alfredo Pironti∗ and Pierre-Yves Strub‡

Add to Reading List

Source URL: mitls.org

Language: English - Date: 2014-02-27 10:40:02
    843Cryptography / Computer access control / Computer security / Certificate authority / IdenTrust / Identity theft / Digital identity / Multi-factor authentication / Authentication / Smart card / E-commerce / Health Insurance Portability and Accountability Act

    The Payment Factory: Strengthening Compliance and Improving Internal Controls for Corporate Treasurers IdenTrust

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:47
    844

    Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2014-06-14 02:22:08
      845Computer network security / Crimes / Deception / E-commerce / Entrust / Man-in-the-browser / Fraud / Datacard Group / Layered security / Authentication / Transaction verification

      +entrust.com/financial-institutions Entrust TransactionGuard for Real-Time Fraud Detection

      Add to Reading List

      Source URL: www.entrust.com

      Language: English - Date: 2016-01-14 11:24:35
      846

      A User-Friendly Approach to Human Authentication of Messages Jeff King and Andre dos Santos College of Computing, Georgia Institute of Technology? Atlanta GA 30332, USA {peff,andre}@cc.gatech.edu

      Add to Reading List

      Source URL: fc05.ifca.ai

      Language: English - Date: 2005-01-17 12:01:10
        847Wirecard / Computer access control / Online banking / Etan / Transaction authentication number / East Timor and Indonesia Action Network / Fax / Maestro

        eBanking First Use Information on the eBanking services of Wirecard Bank AG All you need is a PC with Internet access, the eTAN Generator and your ec/Maestro card to authorize your payments. Before using our eBanking ser

        Add to Reading List

        Source URL: www.wirecardbank.com

        Language: English - Date: 2015-05-12 04:27:22
        848

        Summer School for Advanced Studies on Biometrics for Secure Authentication: Biometrics, Forensic Science and the Quest for Identity Alghero, Italy - June,

        Add to Reading List

        Source URL: biometrics.uniss.it

        Language: English - Date: 2015-11-22 09:18:17
          849Computer access control / E-commerce / Online banking / Cybercrime / Security token / Bank / Transaction authentication number / User / Password / Computer security / Multi-factor authentication / Guardian Analytics

          Online Banking User Guide Business Online Security The security of your information is one of our most important responsibilities. You can be confident, knowing that Alpine Bank is dedicated to ensuring the highest level

          Add to Reading List

          Source URL: www.alpinebank.com

          Language: English - Date: 2013-12-17 13:20:47
          850Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

          White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

          Add to Reading List

          Source URL: lexisnexis.com

          Language: English - Date: 2014-10-15 08:44:10
          UPDATE