E-Authentication

Results: 422



#Item
111Cryptographic protocols / Yahoo! / Author Domain Signing Practices / Internet / Data / DomainKeys Identified Mail / Internet protocols / DomainKeys / Domain Name System / Email authentication / Spam filtering / Computing

Network Working Group Request for Comments: 5617 Category: Standards Track E. Allman Sendmail, Inc.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2009-08-12 19:52:53
112Computer security / Technology / Smart cards / One-time password / Transaction authentication number / Password / Contactless smart card / Subscriber identity module / Security token / ISO standards / Ubiquitous computing / Security

mobile Solution for e-travel document security exchange

Add to Reading List

Source URL: www.monetplus.cz

Language: English - Date: 2014-12-01 10:30:08
113Iris recognition / University of Cambridge Computer Laboratory / Surveillance / Identity management / Authentication / Iris / Password / Security / Access control / Biometrics

Proceedings of The 4th International Platform on Integrating Arab e-Infrastructure in a Global Environment e-AGE 2014

Add to Reading List

Source URL: asrenorg.net

Language: English - Date: 2015-01-15 05:34:56
114Computer network security / Hacking / Advanced persistent threat / Malware / Vulnerability / Social engineering / Exploit / Password / Transaction authentication number / Cyberwarfare / Computer security / Security

T H R E A T R E P O R T M-Trends 2015: ®

Add to Reading List

Source URL: www2.fireeye.com

Language: English - Date: 2015-04-24 23:37:32
115Identity document / Estonia / Digital identity / Digital signature / Two-factor authentication / Estonian ID card / Cryptography / Security / Identity management

BECOME AN ESTONIAN E-RESIDENT

Add to Reading List

Source URL: e-estonia.com

Language: English - Date: 2014-11-19 19:46:26
116Computing / Software / Two-factor authentication / User interface techniques / Password / Form

HOW TO REGISTER ESTABLISHMENT Visit the epfindia website having URL: http://www.epfindia.gov.in. Click Employer e-SEWA link.

Add to Reading List

Source URL: www.epfindia.com

Language: English - Date: 2012-03-27 05:45:29
117Technology / Data / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Authenticator / Supplicant / Wired Equivalent Privacy / Wireless access point / Computer network security / Computing / Wireless networking

I N D U S T R Y T R E N D S Will IEEE 802.1X Finally Take Off in 2008? Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:45:56
118Privacy / Radio-frequency identification / Ubiquitous computing / Wireless / Data / Hamming weight / Authentication protocol / Password authentication protocol / Information / Computing / Automatic identification and data capture

Yet Another Ultralightweight Authentication Protocol that is Broken Gildas Avoine, Xavier Carpent Universit´e catholique de Louvain B-1348 Louvain-la-Neuve Belgium

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 06:16:06
119Spam filtering / Computer security / Hash function / Computing / Cyberwarfare / Proof-of-work system / Search algorithms / Email authentication / Hashcash

Hashcash - Amortizable Publicly Auditable Cost-Functions Adam Back e-mail: 1st August 2002 Abstract We present a distributed efficiently amortizable CPU cost-function with no trap–door. The absence

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:55
120Identity management / Password / Access control / Fingerprint / Password manager / Two-factor authentication / Security / Biometrics / Identification

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:49:15
UPDATE