Authentication

Results: 7063



#Item
91

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes

Add to Reading List

Source URL: oaklandsok.github.io

Language: English - Date: 2018-03-14 15:33:55
    92

    Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates

    Add to Reading List

    Source URL: www.instantssl.com

    Language: English - Date: 2017-11-06 10:28:09
      93

      Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof Naveen Sastry

      Add to Reading List

      Source URL: www.chriskarlof.com

      Language: English - Date: 2012-01-02 15:39:37
        94

        Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Antoine Delignat-Lavaud, Karthikeyan Bhargavan, Alfredo Pironti (Prosecco, Inria Paris) Cédric Fournet (Microsoft Research)

        Add to Reading List

        Source URL: antoine.delignat-lavaud.fr

        Language: English - Date: 2014-07-18 09:37:09
          95

          Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2016-04-12 08:28:30
            96

            Authentication for Amateur Radio Why We Need It and How To Implement It Bryan Hoyer KG6GEU

            Add to Reading List

            Source URL: microhams.blob.core.windows.net

            - Date: 2015-05-23 18:54:18
              97

              PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

              Add to Reading List

              Source URL: mjwilber.org

              - Date: 2015-09-25 13:01:34
                98

                IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

                Add to Reading List

                Source URL: dovetail.com

                - Date: 2012-06-14 11:36:21
                  99

                  API (/api/) Generated: Wed, 03 Jan:21:03 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

                  Add to Reading List

                  Source URL: docs-archive.fastly.com

                  - Date: 2018-04-02 17:41:20
                    100

                    Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

                    Add to Reading List

                    Source URL: www.azbar.org

                    - Date: 2017-05-17 18:29:57
                      UPDATE