Authentication

Results: 7063



#Item
851Eye / Computer access control / Cognitive science / Vision / Surveillance / Eye tracking / Authentication / Biometrics / Eye movement / Support vector machine / Human eye / Login

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics Simon Eberz Kasper B. Rasmussen

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-02-17 04:13:11
852

Lapin: An Efficient Authentication Protocol Based on Ring-LPN Stefan Heyse1 , Eike Kiltz1 , Vadim Lyubashevsky2? , Christof Paar1 , and Krzysztof Pietrzak3?? 1

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2012-06-28 05:35:56
    853

    Authentication with MQAUSX & z/MQAUSX Roger Lacroix http://www.capitalware.com

    Add to Reading List

    Source URL: mqtechconference.com

    Language: English - Date: 2015-10-02 13:01:07
      854Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

      White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

      Add to Reading List

      Source URL: lexisnexis.com

      Language: English - Date: 2014-10-15 08:44:07
      855

      Protocols and Light-Weight Algorithms for Wireless Authentication through Side Channels in IEEECommunication

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2010-04-20 22:15:19
        856

        The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

        Add to Reading List

        Source URL: www1.spms.ntu.edu.sg

        Language: English - Date: 2015-10-05 00:19:27
          857

          KeyLemon Online Authentication Solution Oasis for Mobile Biometric OVERVIEW For rapid development of mobile apps utilizing face biometric authentication, KeyLemon provides the OASIS client-server library. Supporting both

          Add to Reading List

          Source URL: www.keylemon.com

          Language: English - Date: 2015-10-30 03:23:12
            858

            [Short Paper] The MVP Web-based Authentication Framework Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan, and Robert Biddle Carleton Univers

            Add to Reading List

            Source URL: fc12.ifca.ai

            Language: English
              859

              Will two-photon lithography become a valuable tool against product counterfeiting? Security features that enable the authentication of products and deter product imitators will be more and more important for a variety of

              Add to Reading List

              Source URL: www.nanoprecision-3d.com

              Language: English - Date: 2015-07-02 01:34:48
                860Cryptography / Computer security / Computing / Computer access control / Federated identity / Access control / Computer network security / Electronic authentication / Identity management / Authentication / OpenSSH / Application security

                Adaptive Defenses for Commodity Software through Virtual Application Partitioning

                Add to Reading List

                Source URL: www.cs.columbia.edu

                Language: English - Date: 2012-10-05 00:01:36
                UPDATE