Authentication

Results: 7063



#Item
901Health / Computer security / Identity management / Computer access control / Health informatics / Health economics / Public health / Identity theft / Personal health record / Authentication / Identity assurance / Health information exchange

White Paper The Most Important Question in Identity Management for Health Care Your answer points the way to preventing medical

Add to Reading List

Source URL: lexisnexis.com

Language: English - Date: 2014-10-15 08:44:01
902

Strengthening User Authentication through Opportunistic Cryptographic Identity Assertions Alexei Czeskis Michael Dietz

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2012-09-14 15:44:13
    903

    1 How Do Correlation and Variance of Base-Experts Affect Fusion in Biometric Authentication Tasks? Norman Poh and Samy Bengio

    Add to Reading List

    Source URL: bengio.abracadoudou.com

    Language: English - Date: 2004-12-21 02:21:40
      904Computer security / Security / Computer access control / Cryptography / Identity management / Cybercrime / Password / Challengeresponse authentication / Computer virus / Antivirus software / Multi-factor authentication / Password policy

      “...no one can hack my mind”: Comparing Expert and Non-Expert Security Practices Iulia Ion Rob Reeder

      Add to Reading List

      Source URL: www.usenix.org

      Language: English
      905Computer access control / Computing / Software / Cryptography / Smartphones / Federated identity / Access control / Mobile operating systems / Multi-factor authentication / Authentication / Mobile app / Password

      SIGCHI Conference Proceedings Format

      Add to Reading List

      Source URL: www.medien.ifi.lmu.de

      Language: English - Date: 2015-09-15 05:03:41
      906Cognitive science / Neuropsychology / Cognition / Memory / Psychology / Perception / Priming / Kernel / Working memory

      User Authentication Using Human Cognitive Abilities Asadullah Al Galib and Reihaneh Safavi-Naini University of Calgary {aagalib, rei}@ucalgary.ca

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:33:07
      907Computing / Cryptography / Computer network security / Computer security / IPsec / Virtual private networks / Cryptographic protocols / Cryptographic software / StrongSwan / Internet Key Exchange / RADIUS / Extensible Authentication Protocol

      The Open Source VPN Solution for Mixed Platforms  Secure password login using IKEv2 EAP methods.  User credentials on Active Directory or FreeRadius.  strongSwan VPN Gateway scales up to 10‘000 clients.

      Add to Reading List

      Source URL: www.strongswan.org

      Language: English - Date: 2010-06-11 08:24:10
      908

      RFC 7617 : The ’Basic’ HTTP Authentication Scheme St´ephane Bortzmeyer <> Premi`ere r´edaction de cet article le 5 octobre 2015

      Add to Reading List

      Source URL: www.bortzmeyer.org

      Language: French - Date: 2016-01-16 13:38:38
        909Access control / Computer access control / Authentication / Computer file / Trusted Computing / File system / Authorization / Facebook / PERMIS / Internet privacy / Windows / Tar

        Toward strong, usable access control for shared distributed data

        Add to Reading List

        Source URL: manyasleeper.com

        Language: English - Date: 2015-07-08 14:57:22
        910

        Private Eyes: Secure Remote Biometric Authentication Ewa Syta1 , Michael J. Fischer1 , David Wolinsky1 , Abraham Silberschatz1 , Gina Gallegos-Garc´ıa2 and Bryan Ford1 1 Department 2 Department

        Add to Reading List

        Source URL: dedis.cs.yale.edu

        Language: English - Date: 2015-09-04 04:40:51
          UPDATE