Challengeresponse authentication

Results: 50



#Item
11Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
12Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Security hacker / Password strength / Password policy

MISSION: To broaden the knowledge and promote values necessary for Maine’s local and county government Administrators to better serve their communities. A publication of the Maine Town, City

Add to Reading List

Source URL: www.mtcma.org

Language: English - Date: 2015-07-02 11:09:14
13Prevention / Computer access control / Access control / Password / Security / Challengeresponse authentication / Password notification email / Password policy

Black Canada with red flag - CMYK

Add to Reading List

Source URL: www.saskatchewan.ca

Language: English - Date: 2015-10-21 17:07:18
14Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
15Computer access control / Cryptography / Automatic identification and data capture / Computer security / Security / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Authentication / Challengeresponse authentication / Password

Microsoft Word - final_revised.doc

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-06-19 05:33:30
16Cryptography / IOS jailbreaking / SHSH blob / Commitment scheme / IP / Interactive proof system / Boolean algebra / Challengeresponse authentication

JOURNAL OF COMPUTER AND SYSTEM SCIENCES

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:04
17Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
18Computer access control / Cryptography / Obfuscation / Password / Security / Challengeresponse authentication / Crypt / Microsoft Word / Draw a Secret / Password cracking

Microsoft Word - 29_Paper.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
19Cryptography / IP / Distance-bounding protocol / Challengeresponse authentication / Computational complexity theory / Interactive proof system

Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
20Security / Prevention / Computer security / Cryptography / Computer access control / Password / Biometrics / Speaker recognition / Authentication / Challengeresponse authentication / Key / Password manager

HCI and Security Systems Andrew S. Patrick A Chris Long Scott Flinn

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-08 08:50:30
UPDATE