Authentication

Results: 7063



#Item
951

W EB AUTHENTICATION IN PRACTICE Joseph Bonneau Computer Laboratory

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2014-05-03 16:10:02
    952Security / Prevention / Computer access control / Identity documents / Access control / Cybercrime / Identity management / Password / Mobile security / Authentication / Transaction authentication number / Computer security

    Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:57
    953Cryptography / Computer network security / Computer security / Cyberwarfare / Kerberos / Key distribution center / Authentication protocol / Authentication / Ticket

    Stealing credentials for impersonation Emmanuel Bouillon October 29, 2010 Introduction

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2010-10-29 15:08:35
    954

    Security in Voice Authentication by Chenguang Yang A Dissertation Submitted to the Faculty of the

    Add to Reading List

    Source URL: www.wpi.edu

    Language: English - Date: 2014-03-27 12:10:06
      955Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

      The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

      Add to Reading List

      Source URL: pub.ist.ac.at

      Language: English - Date: 2014-07-24 05:23:52
      956Economy / Computer access control / Stock market / Finance / Access control / Authentication / Notary / Packaging / Deposit account / Security / Smart card

      WDB-eBanking-Bedingungen_PK_DE_EN.indd

      Add to Reading List

      Source URL: www.wirecardbank.com

      Language: English - Date: 2015-10-06 05:34:23
      957

      How to Configure the Citrix Receiver with Two-Factor Authentication on a personal device

      Add to Reading List

      Source URL: employees.dartmouth-hitchcock.org

      Language: English - Date: 2014-11-21 16:09:45
        958

        Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        Language: English - Date: 2009-07-24 09:49:57
          959Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Counterfeit consumer goods / Counterfeit / Authentication

          Synchronized Secrets Approach for RFID-enabled Anti-Counterfeiting A. Ilic, M. Lehtonen, F. Michahelles, E. Fleisch ETH Zurich, Information Management, CH-8092 Zurich, Switzerland {ailic,mlehtonen,fmichahelles,efleisch}@

          Add to Reading List

          Source URL: cocoa.ethz.ch

          Language: English - Date: 2013-05-23 02:03:26
          960Message-oriented middleware / Java enterprise platform / Transaction processing / IBM WebSphere MQ / Managed file transfer / IBM WebSphere / Authentication / CICS / Message queue / Middleware analyst

          Microsoft PowerPoint1577 WebSphere MQ Securing Your Queue Manager.ppt [Compatibility Mode]

          Add to Reading List

          Source URL: t-rob.net

          Language: English - Date: 2012-05-01 02:38:08
          UPDATE