Authentication

Results: 7063



#Item
61Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.

Privacy concerns of implicit secondary factors for web authentication Joseph Bonneau 1.

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2018-05-15 14:47:16
    62Equivalence decisions under MiFID II/MiFIR and PSD2 Regulatory Technical Standards on Strong Customer Authentication and Secure Communication

    Equivalence decisions under MiFID II/MiFIR and PSD2 Regulatory Technical Standards on Strong Customer Authentication and Secure Communication

    Add to Reading List

    Source URL: www.europarl.europa.eu

    Language: English - Date: 2018-01-23 10:21:15
      63The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1  Computer Science Department

      The Interleaved Authentication for Filtering False Reports in Multipath Routing based Sensor Networks Youtao Zhang 1,3 , Jun Yang 2 , Hai T Vu 3 1 Computer Science Department

      Add to Reading List

      Source URL: people.cs.pitt.edu

      Language: English - Date: 2006-02-15 11:43:51
        64Generated: Wed, 05 Jul:43:07 +0000  API (/api/) Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to authenticate your API requests.

        Generated: Wed, 05 Jul:43:07 +0000 API (/api/) Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to authenticate your API requests.

        Add to Reading List

        Source URL: docs-archive.fastly.com

        Language: English - Date: 2018-04-20 17:02:57
        65Stark  Tamperproof Authentication to Resist Keylogging Tilo M¨ uller, Hans Spath, Richard M¨ackl, and Felix C. Freiling Department of Computer Science

        Stark Tamperproof Authentication to Resist Keylogging Tilo M¨ uller, Hans Spath, Richard M¨ackl, and Felix C. Freiling Department of Computer Science

        Add to Reading List

        Source URL: fc13.ifca.ai

        Language: English - Date: 2013-03-27 20:42:00
          66API (/api/)  Generated: Mon, 02 Apr:52:41 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

          API (/api/) Generated: Mon, 02 Apr:52:41 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

          Add to Reading List

          Source URL: docs-archive.fastly.com

          Language: English - Date: 2018-07-31 19:15:59
          67ImageWare® Provides Sales Update of GoVerifyID® Biometric Authentication Technology Announces Additional License Sales to Existing Federal Government Customer in Addition to Four New Partner Sales San Diego (April 10,

          ImageWare® Provides Sales Update of GoVerifyID® Biometric Authentication Technology Announces Additional License Sales to Existing Federal Government Customer in Addition to Four New Partner Sales San Diego (April 10,

          Add to Reading List

          Source URL: www.iwsinc.com

          Language: English - Date: 2018-04-10 11:49:34
            68API (/api/)  Generated: Wed, 01 Mar:02:53 +0000 Authentication (/api/auth)  NOTE: On May 15th, 2017, account-level API keys will be retired in favor of personal API tokens

            API (/api/) Generated: Wed, 01 Mar:02:53 +0000 Authentication (/api/auth)  NOTE: On May 15th, 2017, account-level API keys will be retired in favor of personal API tokens

            Add to Reading List

            Source URL: docs-archive.fastly.com

            Language: English - Date: 2018-04-20 17:02:36
            69An evaluation of hypothetical attacks against the PassWindow authentication method Matthew Slyman, University of Cambridge Sean O’Neil, VEST Corporation Gadescu Horatiu Nicolae, University of Birmingham Ben van der Mer

            An evaluation of hypothetical attacks against the PassWindow authentication method Matthew Slyman, University of Cambridge Sean O’Neil, VEST Corporation Gadescu Horatiu Nicolae, University of Birmingham Ben van der Mer

            Add to Reading List

            Source URL: www.passwindow.com

            Language: English - Date: 2014-04-17 22:27:09
              70Patterns in the Wild: A field study of the usability of pattern and pin-based authentication on Mobile Devices

              Patterns in the Wild: A field study of the usability of pattern and pin-based authentication on Mobile Devices

              Add to Reading List

              Source URL: www.medien.ifi.lmu.de

              Language: English - Date: 2013-09-13 03:44:31