Key authentication

Results: 993



#Item
381Central Authentication Service / Federated identity / Single sign-on / Password / Password manager / SAP Logon Ticket / System software / Computer security / Software

Case Study Pepperdine University Integrates Its Web Systems with CAS Key Takeaways: ! Central Authentication Service (CAS) enables simplified web application development and increased security

Add to Reading List

Source URL: omniupdate.com

Language: English - Date: 2013-06-20 13:00:27
382Public key infrastructure / Public key certificate / Certificate authority / Phishing / Digital signature / Password / Authentication / Certificate policy / Certificate server / Cryptography / Public-key cryptography / Key management

Microsoft PowerPoint - Application of PKI in IT Security v4.1.ppt [相容模式]

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-10-26 00:41:55
383Internet privacy / Webmail / Internet / Web 2.0 / Email authentication / S/MIME / Gmail / Email encryption / Public-key cryptography / Computing / Cryptography / Email

Confused Johnny: When Automatic Encryption Leads to Confusion and Mistakes Scott Ruoti, Nathan Kim, Ben Burgon, Timothy van der Horst, Kent Seamons Internet Security Research Lab Computer Science Department Brigham Young

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-07-03 09:36:38
384Bluetooth / Wireless / Key-agreement protocol / Authentication / Man-in-the-middle attack / Advanced Encryption Standard / Cryptography / Technology / Cryptographic protocols

Bypassing Passkey Authentication in Bluetooth Low Energy (extended abstract) Tomáš Rosa [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-23 07:35:21
385Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography

© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2011-05-18 00:11:55
386Two-factor authentication / Password / BioAPI / Single sign-on / Biometrics / Authentication / Password manager / Security token / Security / Access control / Computer security

BIO-key Biometric Service Provider for IBM Security Access Manager for Enterprise Single Sign-On

Add to Reading List

Source URL: www.redbooks.ibm.com

Language: English - Date: 2012-07-19 16:51:19
387Password / Cryptographic software / Phishing / S/KEY / Challenge-response authentication / GrIDsure / Password policy / OTPW / Security / Computer security / Access control

Graphical Passwords: Learning from the First Twelve Years Robert Biddle, Sonia Chiasson, P.C. van Oorschot School of Computer Science Carleton University, Ottawa, Canada

Add to Reading List

Source URL: hotsoft.carleton.ca

Language: English - Date: 2011-01-04 11:10:21
388Cryptographic software / Internet privacy / Email authentication / X.509 / Email encryption / Key management / Password / Pretty Good Privacy / Web of trust / Cryptography / Public-key cryptography / PGP

FileAssurity OpenPGP Encrypt and digitally sign your files, folders, documents, instant messages and emails. Securely delete them beyond US DOD standards. Communicate securely with PGP v5.x+ or any other OpenPGP user. Pr

Add to Reading List

Source URL: www.articsoft.com

Language: English - Date: 2013-12-10 12:53:06
389Packaging / Printing / Civil law / Security paper / Authentication / Watermark / Public key certificate / Security / Key management / Public-key cryptography

March[removed]NSW Certificates of Title security features What is a Certificate of Title? A Certificate of Title is a copy of the related folio of the Torrens Land Title Register that is issued by Land and Property

Add to Reading List

Source URL: rgdirections.lpi.nsw.gov.au

Language: English - Date: 2013-06-23 21:04:31
390Certificate authorities / Comodo Group / Cryptographic protocols / Public key infrastructure / X.509 / Two-factor authentication / Public key certificate / Authentication / Phishing / Cryptography / Public-key cryptography / Key management

Comodo Custom Client Certificates Highly Secure Authentication of Customers and Employees www.instantssl.com [removed]

Add to Reading List

Source URL: www.instantssl.com

Language: English - Date: 2014-10-06 14:46:00
UPDATE