Authentication

Results: 7063



#Item
81

I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

Add to Reading List

Source URL: www.iwsinc.com

Language: English - Date: 2017-10-18 21:20:11
    82

    sayI: Trusted User Authentication at Internet Scale Jon A. Solworth Wenyuan Fei University of Illinois at Chicago

    Add to Reading List

    Source URL: www.ethos-os.org

    Language: English - Date: 2017-04-30 19:19:47
      83

      We Accelerate Growth www.frost.com Cloud-based Identity and Authentication:

      Add to Reading List

      Source URL: www.iwsinc.com

      Language: English - Date: 2016-08-23 14:02:44
        84

        ZEBRA: Zero-Effort Bilateral Recurring Authentication Shrirang Mare∗ , Andres Molina-Markham∗ , Cory Cornelius† , Ronald Peterson∗ and David Kotz∗ ∗ Institute for Security, Technology, and Society, Dartmouth

        Add to Reading List

        Source URL: sharps.org

        Language: English - Date: 2014-07-08 13:27:51
          85

          The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

          Add to Reading List

          Source URL: www1.spms.ntu.edu.sg

          Language: English - Date: 2015-10-04 23:56:24
            86

            Study Report on Biometrics in E-Authentication

            Add to Reading List

            Source URL: www.biosig-id.com

            Language: English - Date: 2016-01-21 00:15:16
              87

              Towards Kerberizing Web Identity and Services 22 December 2008 Abstract Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. Th

              Add to Reading List

              Source URL: www.jeffhodges.org

              Language: English - Date: 2012-07-11 18:17:19
                88

                www.incommon.org Libraries Combine to Develop Shibboleth-EZproxy Hybrid Combination means a move away from IP authentication; provides greater control Libraries face one of the most complex sit

                Add to Reading List

                Source URL: incommon.org

                Language: English - Date: 2010-10-27 09:19:08
                  89

                  Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

                  Add to Reading List

                  Source URL: www.andrew.cmu.edu

                  Language: English - Date: 2018-08-02 14:42:46
                    90

                    Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methods

                    Add to Reading List

                    Source URL: www.uncitral.org

                    Language: English - Date: 2009-11-16 08:32:34
                      UPDATE