Authentication

Results: 7063



#Item
871Computer access control / Identity management / Computer security / Identity / Federated identity / Metadata standards / Identity assurance / OpenID / SAML 2.0 / Security Assertion Markup Language / Identity provider / Authentication

Toward Mending Two Nation-Scale Brokered Identification Systems

Add to Reading List

Source URL: petsymposium.org

Language: English - Date: 2015-06-23 17:21:44
872

1 IMAPS: Imbricated Authentication Protocol Suite for Mobile Users and Groups Nidal Aboudagga∗ ,Giacomo de Meulenaer∗ , Mohamed Eltoweissy† and Jean-Jacques Quisquater∗ ∗ UCL-Crypto group, Place du Levant 3, 1

Add to Reading List

Source URL: www.uclouvain.be

Language: English - Date: 2011-12-14 05:30:34
    873

    Energy Efficient Memory Authentication Mechanism in Embedded Systems Satyajeet Nimgaonkar Mahadevan Gomathisankaran

    Add to Reading List

    Source URL: nsl.cse.unt.edu

    Language: English - Date: 2012-01-08 08:09:36
      874Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

      SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

      Add to Reading List

      Source URL: nvlpubs.nist.gov

      Language: English - Date: 2015-08-04 11:34:10
      875Business / Automatic identification and data capture / Radio-frequency identification / Economy / Humancomputer interaction / Logistics / Supply chain management / Ubiquitous computing / Track and trace / EPCglobal Network / EPCIS / Authentication

      Building Radio frequency IDentification for the Global Environment White Paper RFID Tag Security Authors: Manfred Aigner (TU Graz), Trevor Burbridge (BT

      Add to Reading List

      Source URL: cocoa.ethz.ch

      Language: English - Date: 2013-05-23 01:58:05
      876

      DATA SHEET CA Advanced Authentication At a Glance CA Advanced Authentication is a flexible and scalable solution that incorporates both risk-based authentication methods like device identification, geo-location and user

      Add to Reading List

      Source URL: www.ca.com

      Language: English
        877

        Cache Cookies for Browser Authentication

        Add to Reading List

        Source URL: www.arijuels.com

        Language: English - Date: 2013-09-23 14:32:42
          878Cryptography / Public-key cryptography / Key management / Public key infrastructure / Blog / Authentication / Key

          Schematizing Trust in Named Data Networking Yingdi Yu1, Alex Afanasyev1, David Clark2, kc claffy3, Van Jacobson1, Lixia Zhang1! ! 1. UCLA 2. MIT 3. CAIDA!

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2015-10-03 14:16:59
          879Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

          FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

          Add to Reading List

          Source URL: nvlpubs.nist.gov

          Language: English - Date: 2015-08-04 11:33:21
          880

          Who You Are by way of What You Are: Behavioral Biometric Approaches to Authentication Michael Karlesky, Napa Sae-Bae, Katherine Isbister, Nasir Memon NYU Polytechnic School of Engineering Five MetroTech Center Brooklyn,

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2014-05-22 05:58:12
            UPDATE