Authentication

Results: 7063



#Item
961Network architecture / Emerging technologies / Configuration management / Software-defined networking / Network protocols / OpenFlow / American brands / Access control / Computer network / Cisco Systems / Network switch / Hewlett Packard Enterprise Networking

Authentication for Resilience: the Case of SDN Dongting Yu1 , Andrew W. Moore1 , Chris Hall2 , and Ross Anderson1 1 Computer Laboratory, University of Cambridge 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-12-20 08:55:40
962

Quantum-Secure Message Authentication Codes Dan Boneh Mark Zhandry Stanford University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-11 11:51:07
    963

    WWPass® PassKey™ Strong Authentication The First Line of Defense infected with malware that intercepts your text messages.

    Add to Reading List

    Source URL: www.wwpass.com

    Language: English - Date: 2015-01-20 15:27:18
      964

      RADIATOR AAA SERVER FOR ALL YOUR CURRENT AND FUTURE AUTHENTICATION, AUTHORISATION, AND ACCOUNTING NEEDS WHAT IS RADIATOR

      Add to Reading List

      Source URL: www.open.com.au

      Language: English - Date: 2014-10-01 10:19:23
        965

        The document contains a corrected version of Appendix D of Special Publication 80038B, which specifies examples for the CMAC authentication mode. In particular, the values of the MAC, T, for Examples 14, 15, 18, and 19 h

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-12-30 22:09:47
          966

          Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication Aron Laszka Yevgeniy Vorobeychik

          Add to Reading List

          Source URL: aronlaszka.com

          Language: English - Date: 2015-03-10 01:58:03
            967Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

            +entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

            Add to Reading List

            Source URL: www.entrust.com

            Language: English - Date: 2016-01-14 11:24:30
            968

            Interactive Diffie-Hellman Assumptions With Applications to Password-Based Authentication Michel Abdalla and David Pointcheval Departement d’Informatique ´ Ecole

            Add to Reading List

            Source URL: fc05.ifca.ai

            Language: English - Date: 2005-01-10 11:18:30
              969

              PRESS RELEASE KeyLemon secures Series A Investment Martigny, Switzerland, 2nd September 2013 – KeyLemon, a leading provider of face and speaker recognition solutions for authentication purposes, has closed a Series A

              Add to Reading List

              Source URL: www.keylemon.com

              Language: English - Date: 2014-06-13 09:31:43
                970

                SPLIT AUTH: A DECENTRALIZED SYSTEM FOR WEB AUTHENTICATION by Thomas Parisi A THESIS Submitted to the Faculty of the Stevens Institute of Technology in partial fulfillment of the requirements for the degree of

                Add to Reading List

                Source URL: www.cs.stevens.edu

                Language: English - Date: 2014-01-27 12:05:22
                  UPDATE