Authentication

Results: 7063



#Item
891Comma-separated values / Tab key / Safari

Web Toolbox Guide for Creating Web Surveys Main web tools page: http://www.webservices.uiuc.edu Íbookmark this site 1. Click the “Login to the Toolbox” link (requires Bluestem authentication = NET ID and password) L

Add to Reading List

Source URL: cte.illinois.edu

Language: English - Date: 2008-09-24 12:01:03
892

A Modular Framework for Multi-Factor Authentication & Key Exchange Nils Fleischhacker, Mark Manulis, Amir Azodi SSR 2014@RHUL

Add to Reading List

Source URL: ssr2015.com

Language: English - Date: 2015-06-22 06:35:19
    893Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Communications protocol / Logic / Security protocol notation

    JuneEncryption as an Abstract Datatype: an extended abstract

    Add to Reading List

    Source URL: www.qatar.cmu.edu

    Language: English - Date: 2004-12-05 23:21:27
    894Computer access control / Legal research / LexisNexis / Open-source intelligence / Reed Elsevier / RELX Group / Identity theft / Authentication / Identity management

    White Paper Proving Identity Using LexisNexis® Identity Management Solutions Do you know who you’re talking to? Validate and authenticate identities with more confidence.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:06
    895

    Robust Authentication Using Physically Unclonable Functions Keith B. Frikken1 , Marina Blanton2, and Mikhail J. Atallah3 1 2

    Add to Reading List

    Source URL: www.cse.nd.edu

    Language: English - Date: 2009-09-01 22:27:51
      896

      RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication Tiffany Hyun-Jin Kim1 , Akira Yamada2 , Virgil Gligor1 , Jason Hong1 , and Adrian Perrig1 1

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-03-27 20:41:00
        897

        Data Driven Authentication: On the Effectiveness of User Behaviour Modelling with Mobile Device Sensors Hilmi G¨unes¸ Kayacık∗ , Mike Just∗ , Lynne Baillie∗ , David Aspinall† and Nicholas Micallef∗ ∗ Glasg

        Add to Reading List

        Source URL: www.mostconf.org

        Language: English - Date: 2014-05-17 09:17:31
          898Cryptography / Computing / Internet / Keyword cipher / Password / Obfuscation / Transport Layer Security / Four-square cipher / Classical cipher

          AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps Fangda Cai, Hao Chen Yuanyi Wu

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2015-05-20 23:58:56
          899Computer security / Security / Computer access control / Identity management / Fraud / Identity theft / Authentication / Identity fraud / LexisNexis / Biometrics / Identity verification service / RELX Group

          White Paper Combating Identity Fraud: An Overview of Complementary Approaches Identity fraud demands constantly evolving

          Add to Reading List

          Source URL: lexisnexis.com

          Language: English - Date: 2014-10-15 08:43:57
          900

          Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

          Add to Reading List

          Source URL: fc13.ifca.ai

          Language: English - Date: 2013-03-27 20:42:00
            UPDATE