Authentication

Results: 7063



#Item
861

c In Proc. Third International Conference on Audio- and Video-based Biometric Person Authentication, Springer, Lecture Notes in Computer Science, LNCS-2091, pp. 90–95, Halmstad, Sweden, 6–8 JuneRobust Face

Add to Reading List

Source URL: facedetection.com

Language: English - Date: 2015-03-16 19:55:24
    862

    NCSC-TG-017 Library No,479 Version 1 FOREWORD A Guide to Understanding Identification and Authentication in Trusted Systems

    Add to Reading List

    Source URL: zedz.net

    Language: English - Date: 2002-12-08 10:16:43
      863Computer security / Security / Computer access control / Cybercrime / Identity management / Computer network security / Password / Multi-factor authentication / Phishing / Authentication / Transaction authentication number / LastPass

      Security for an age of zero trust A Two-factor authentication:

      Add to Reading List

      Source URL: www.ciosummits.com

      Language: English - Date: 2016-01-25 16:20:59
      864

      c In Proc. International ECCV 2002 Workshop on Biometric Authentication, ° Springer, Lecture Notes in Computer Science, LNCS-2359, pp. 103–111, Copenhagen, Denmark, JuneGenetic Model Optimization

      Add to Reading List

      Source URL: facedetection.com

      Language: English - Date: 2015-03-16 19:31:34
        865

        2nd Symposium and Bootcamp on the Science of Security (HotSoS)
 April 21st, 2015 Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication Aron Laszka, Yevgeniy Vorobeychik, and Xenofon

        Add to Reading List

        Source URL: aronlaszka.com

        Language: English - Date: 2015-04-21 21:33:14
          866

          OTP Authentication Tokens Wirelessly programmable OTP tokens 01010101100100101101001101110010101011010101010 Key Features •  Strong two-factor authenticator

          Add to Reading List

          Source URL: www.cryptsoft.com

          Language: English - Date: 2016-02-25 10:46:48
            867

            Authentication Mechanisms for Open Distributed Systems by Antonio R. Nicolosi

            Add to Reading List

            Source URL: www.cs.stevens.edu

            Language: English - Date: 2010-03-09 16:23:49
              868Computing / Computer access control / Prevention / Cloud computing / Cloud infrastructure / Password / Identity management / SAML-based products and services / Central Authentication Service

              CAS’s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline

              Add to Reading List

              Source URL: free.eol.cn

              Language: English - Date: 2015-09-28 11:36:24
              869

              Getting web authentication right A best-case protocol for the remaining life of passwords Joseph Bonneau University of Cambridge

              Add to Reading List

              Source URL: www.jbonneau.com

              Language: English - Date: 2014-05-03 16:10:03
                870

                SafeNet Authentication Manager Hotfix

                Add to Reading List

                Source URL: data-protection-updates.safenet-inc.com

                Language: English - Date: 2015-09-21 06:32:54
                  UPDATE