Authentication

Results: 7063



#Item
971

FOR IMMEDIATE RELEASE IDmachines and Probayes join forces to bring powerful predictive analytics to the United States’ enterprise security and information technology markets. Solutions support strong authentication, se

Add to Reading List

Source URL: www.idmachines.com

Language: English - Date: 2010-02-24 01:24:16
    972Pluggable authentication module / Standards organizations / POSIX / Specification / Single sign-on / The Open Group / HMAC-based One-time Password Algorithm / Common Authentication Service Adapter

    Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules EL PR IM

    Add to Reading List

    Source URL: pubs.opengroup.org

    Language: English - Date: 2003-01-28 06:23:48
    973

    Efficient and Secure Source Authentication with Packet Passports Xin Liu and Xiaowei Yang Department of Computer Science University of California, Irvine {xinl,xwy}@ics.uci.edu

    Add to Reading List

    Source URL: djw.cs.washington.edu

    Language: English - Date: 2007-08-24 02:34:08
      974Economy / Academia / Prevention / Security engineering / Privacy / Internet privacy / Password / Authentication / Software design pattern / Security Patterns / Pattern language / Consumer privacy

      Privacy Design Patterns and Anti-Patterns Patterns Misapplied and Unintended Consequences Nick Doty Mohit Gupta

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2013-07-23 08:07:23
      975

      Hamster™ Pro Duo/CL SecuGen Hamster Pro Duo/CL is suitable for any contactless smart card application where dual factor authentication is needed for higher security without sacrificing convenience. It features the indu

      Add to Reading List

      Source URL: www.dds-pak.com

      Language: English - Date: 2015-02-28 01:26:49
        976Computing / Software / Computer access control / Academic publishing / Andrew W. Mellon Foundation / Federated identity / Ithaka Harbors / Proxy server / Authentication / Android / Shibboleth / Project MUSE

        LOGIN PASSWORD ISSUE BRIEF Meeting Researchers

        Add to Reading List

        Source URL: www.sr.ithaka.org

        Language: English - Date: 2015-09-27 15:59:43
        977

        Secure Modular Password Authentication for the Web using Channel Bindings Mark Manulis, Douglas Stebila, Nick Denham SSR 2014@RHUL

        Add to Reading List

        Source URL: ssr2015.com

        Language: English - Date: 2015-06-22 06:35:15
          978Family Educational Rights and Privacy Act / Privacy / Internet privacy / Cryptography / Authentication / Computer security / Security

          Student Privacy and eCommons eCommons allows site participants to interact with each other within a site. Depending on which tools an instructor uses in their course site, students may be able to have access to the name

          Add to Reading List

          Source URL: registrar.ucsc.edu

          Language: English - Date: 2014-08-31 11:32:39
          979

          The Enterprise Authentication Implementation Roadmap DRAFT August 2006 Open comment period closes October 1, 2006. Send email to Ann West at awest at educause.edu with comments. Several new business needs are pushing ca

          Add to Reading List

          Source URL: www.nmi-edit.org

          Language: English - Date: 2006-08-28 12:04:27
            980

            Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

            Add to Reading List

            Source URL: joye.site88.net

            Language: English - Date: 2015-09-04 19:44:14
              UPDATE