Multi-factor authentication

Results: 297



#Item
51GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices Mohamed Khamis1 , Florian Alt1 , Mariam Hassib1,2 , Emanuel von Zezschwitz1 , Regina Hasholzner1 , Andreas Bulling3 1

GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices Mohamed Khamis1 , Florian Alt1 , Mariam Hassib1,2 , Emanuel von Zezschwitz1 , Regina Hasholzner1 , Andreas Bulling3 1

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2016-02-13 07:07:53
52

PDF Document

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
53PCI DSS 3.2 Resource Guide The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during and after purcha

PCI DSS 3.2 Resource Guide The Payment Card Industry Security Standards Council (PCI SSC) has published a new version of the industry standard that businesses use to safeguard payment data before, during and after purcha

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2016-04-28 11:41:13
54SafeSign Identity Client & Imprivata Strong authentication and Single Sign On OneSign Single Sign On (SSO) Password security and access

SafeSign Identity Client & Imprivata Strong authentication and Single Sign On OneSign Single Sign On (SSO) Password security and access

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:28
55SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
56“I’m Stuck!”: A Contextual Inquiry of People with Visual Impairments in Authentication

“I’m Stuck!”: A Contextual Inquiry of People with Visual Impairments in Authentication

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
57February 2014 Feature Article: Phishing Scam Update Table of Contents Phishing Scam Update ................................................................................................................................

February 2014 Feature Article: Phishing Scam Update Table of Contents Phishing Scam Update ................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2014-04-17 09:04:58
58Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
592016 SECURITY P R E D I CT I O N S AN ANNUAL REPORT BY FORCEPOINT™ SECURITY LABS™

2016 SECURITY P R E D I CT I O N S AN ANNUAL REPORT BY FORCEPOINT™ SECURITY LABS™

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-03-29 10:04:50
60Programming YubiKeys for Okta

Programming YubiKeys for Okta

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-26 12:45:09