Authentication

Results: 7063



#Item
981

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan∗ University of Texas at San Antonio , Abstract

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2015-08-01 03:16:29
    982

    Towards Secure and Dependable Authentication and Authorization Infrastructures Diego Kreutz, Alysson Bessani Faculdade de Ciências, Universidade de Lisboa, Portugal , Abstra

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2014-08-10 21:56:45
      983Computing / Technology / Software / Mobile phones / Computer access control / Information appliances / Cloud clients / Smartphones / Mobile app / Security token / Mobile device management / Mobile device

      Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

      Add to Reading List

      Source URL: www.entrust.com

      Language: English
      984

      S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

      Add to Reading List

      Source URL: people.cis.ksu.edu

      Language: English - Date: 2011-07-01 14:16:47
        985

        1.1 Authentication and Authorization Authentication is the process by which the identity of a user, system, or service is verified. • SUPPLIER Service must interoperate with UNIVERSITY’s Shibboleth IdP (Identity Prov

        Add to Reading List

        Source URL: identity.psu.edu

        Language: English - Date: 2014-11-10 16:21:16
          986Cryptography / Password / Security / Computer access control / Key / Authentication / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof

          LOGO_SECURITYANDTRUSTE_RUSH_36

          Add to Reading List

          Source URL: isc2015.item.ntnu.no

          Language: English - Date: 2015-09-19 12:51:00
          987Internet Standards / Message authentication codes / Advanced Encryption Standard / Poly1305 / Stream ciphers / Cryptographic software / Salsa20 / Daniel J. Bernstein / Cipher suite / Authenticated encryption / LibreSSL / Transport Layer Security

          ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

          Add to Reading List

          Source URL: www.ietf.org

          Language: English - Date: 2013-11-05 13:13:43
          988

          Adaptive Message Authentication for Vehicular Networks Nikodin Ristanovic Panos Papadimitratos George Theodorakopoulos Jean-Pierre Hubaux Jean-Yves Le Boudec

          Add to Reading List

          Source URL: users.cs.cf.ac.uk

          Language: English - Date: 2012-09-20 10:46:23
            989

            Passwords and the Evolution of Imperfect Authentication Joseph Bonneau Stanford University & EFF Cormac Herley

            Add to Reading List

            Source URL: www.jbonneau.com

            Language: English - Date: 2015-08-20 03:12:30
              990Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Security question / Self-service password reset / Password policy

              Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

              Add to Reading List

              Source URL: www.fmo.hawaii.edu

              Language: English - Date: 2014-07-21 21:53:18
              UPDATE