Authentication

Results: 7063



#Item
71

CLAVISTER Multi Factor Authentication F E AT U R E S ƒƒ strong

Add to Reading List

Source URL: www.hermitage.be

Language: English - Date: 2017-11-09 05:58:22
    72

    Final Report Metadata Management & User Authentication Subprojects of the “Nationallizenzen” Project

    Add to Reading List

    Source URL: edoc.unibas.ch

    Language: English - Date: 2017-11-27 23:10:29
      73

      A Session Mix-up Attack on the UMTS/LTE Authentication and Key Agreement Protocols Short talk at IEEE Computer Security Foundations Symposium Cambridge MA, June 26, 2012 Stig F. Mjølsnes

      Add to Reading List

      Source URL: csf2012.seas.harvard.edu

      Language: English - Date: 2012-07-05 18:15:12
        74

          Standard:  Authentication  Management     Purpose:   To  establish  minimum  requirements  for  the  secure  use  and  storage  of  authentication  

        Add to Reading List

        Source URL: it.ufl.edu

        Language: English - Date: 2017-09-14 12:20:37
          75

          Policy 623 Authentication

          Add to Reading List

          Source URL: oit.alabama.gov

          Language: English - Date: 2017-09-20 12:16:30
            76

            Two-factor authentication for extra data protection. You can use ESET Secure Authentication for: • Accessing your company’s VPN

            Add to Reading List

            Source URL: cdn1.esetstatic.com

            Language: English - Date: 2017-05-09 05:46:40
              77

              Privacy, Discovery, and Authentication for the Internet of Things∗ David J. Wu1 , Ankur Taly2 , Asim Shankar2 , and Dan Boneh1 1 Stanford University

              Add to Reading List

              Source URL: iot.stanford.edu

              Language: English - Date: 2016-09-10 18:15:38
                78

                EXPERIENCE SIMPLER, STRONGER AUTHENTICATION AGENDA The Problem The Solution The Alliance

                Add to Reading List

                Source URL: fidoalliance.org

                - Date: 2016-06-17 18:31:49
                  79

                  Permutation-based encryption, authentication and authenticated encryption Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 , and Gilles Van Assche1 1 2

                  Add to Reading List

                  Source URL: keccak.team

                  Language: English - Date: 2017-08-22 12:54:45
                    80

                    Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk.

                    Language: English - Date: 2009-02-25 10:33:23
                      UPDATE