Authentication

Results: 7063



#Item
881

How to Attack Two-Factor Authentication Internet Banking Manal Adham1 , Amir Azodi1,3 , Yvo Desmedt2,1 , and Ioannis Karaolis1 1 2

Add to Reading List

Source URL: fc13.ifca.ai

Language: English - Date: 2013-03-27 20:42:00
    882Access control / Identifiers / Identity management / Computer access control / Automatic identification and data capture / EPCglobal / Authentication / Radio-frequency identification / Track and trace / Digital identity / Business process modeling / Electronic Product Code

    Microsoft Word - epedigree_with_dual_ownership_ubisafe_ai_final.doc

    Add to Reading List

    Source URL: cocoa.ethz.ch

    Language: English - Date: 2013-05-23 02:08:29
    883Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

    The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

    Add to Reading List

    Source URL: npdoty.name

    Language: English - Date: 2014-03-25 02:38:49
    884

    Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2009-02-25 10:33:23
      885Economy / Financial services / Money / Wirecard / Computer access control / Online banking / Financial regulation / Transaction authentication number / Etan / Iban / International Bank Account Number

      WDB_eBanking_Erstbenutzung_GK_PK_DE_EN.indd

      Add to Reading List

      Source URL: www.wirecardbank.com

      Language: English - Date: 2016-01-14 06:56:06
      886

      Yale University Department of Computer Science Efficient and Privacy-Preserving Biometric Authentication Ewa Syta David Wolinsky

      Add to Reading List

      Source URL: dedis.cs.yale.edu

      Language: English - Date: 2013-01-31 11:59:56
        887Cryptography / Public-key cryptography / Signcryption / Authenticated encryption / Cryptographic protocol / Secure channel / Key authentication / Serge Vaudenay / Encryption / Block cipher / Draft:C. Pandu Rangan / Index of cryptography articles

        - Call for participation The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: provsec2015-info@aqua.

        Add to Reading List

        Source URL: security-lab.jaist.ac.jp

        Language: English - Date: 2015-11-09 21:16:55
        888

        THE ROLES OF AUTHENTICATION, AUTHORIZATION & CRYPTOGRAPHY IN EXPANDING SECURITY INDUSTRY TECHNOLOGY [Please note: This Quarterly Technical Update (QTU) presents information about a number of

        Add to Reading List

        Source URL: www.idmachines.com

        Language: English - Date: 2010-02-11 12:11:43
          889Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

          PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

          Add to Reading List

          Source URL: dl.dropboxusercontent.com

          Language: English
          890

          AUTHENTICATION WITH QUANTUM SMART-CARD Jaroslav Hrubý mailto: Institute of Physics of Academy of Sciences of the Czech Republic,

          Add to Reading List

          Source URL: conf.ncku.edu.tw

          Language: English - Date: 2003-12-19 01:13:45
            UPDATE