First Page | Document Content | |
---|---|---|
![]() Date: 2015-01-12 16:12:44Public safety Security controls Federal Information Security Management Act Information security National Institute of Standards and Technology Personally identifiable information Risk management framework Security awareness Authentication Computer security Security Data security | Add to Reading List |
![]() | Multi-touch Authentication Using Hand Geometry and Behavioral Information Yunpeng Song† Zhongmin Cai†*DocID: 1xVWX - View Document |
![]() | Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics Simon Eberz Kasper B. RasmussenDocID: 1xVQY - View Document |
![]() | Short Double- and N -Times-Authentication-Preventing Signatures from ECDSA and More David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1DocID: 1xVQK - View Document |
![]() | FACT SHEET IOT DEVICE AUTHENTICATION Invisible Line of Defense to keep intruders out of your personal dataDocID: 1xVPA - View Document |
![]() | EECS 388 Intro to Computer Security October 7, 2016 Homework 3: Authentication and PasswordsDocID: 1xVMf - View Document |