E-Authentication

Results: 422



#Item
11

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi Dipartimento di Informatica, Universita Ca’ Foscari di Venezia, Via Torino 155, 30170 Venezia, Italy e.i

Add to Reading List

Source URL: www.dsi.unive.it

- Date: 2010-07-27 05:09:29
    12

    PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

    Add to Reading List

    Source URL: www.vast.uccs.edu

    - Date: 2012-07-06 12:46:22
      13

      F E AT U R E Applications of Cavity-Enhanced Absorption Spectrometry for Water Isotope Monitoring in Hydrology, Medical Diagnostics, and Wine Authentication

      Add to Reading List

      Source URL: www.lgrinc.com

      - Date: 2013-04-05 14:59:38
        14

        Agile Authenticated Services What is it about? Multifactor authentication provides stronger authentication than e.g. simple username/password

        Add to Reading List

        Source URL: www.iaik.tugraz.at

        - Date: 2015-12-01 04:00:02
          15Economy / Payment systems / Money / Financial services / E-commerce / Merchant services / Cryptographic protocols / Embedded systems / 3-D Secure / Credit card / Card security code / Authentication

          Definition of Systempay Standard Web Services Version 2.6a Writing, Reviewing, Approval

          Add to Reading List

          Source URL: systempay.cyberpluspaiement.com

          Language: English - Date: 2012-10-17 09:29:30
          16Computer security / Computing / Cryptography / Computer access control / Access control / Password / Security / Cryptographic protocols / Authentication / Digest access authentication / SAP Logon Ticket

          C HA PT E R 9 Implementing Web Security Using auth-lib.pl OVERVIEW A natural extension of most applications is the capability to restrict or track access through the application. To do this, we need a system

          Add to Reading List

          Source URL: www.extropia.com

          Language: English - Date: 2003-08-09 07:16:17
          17Cryptography / Security / Computer access control / Federated identity / Identity documents / Cloud standards / E-commerce / Cloud computing security / Authentication / OpenID / Electronic identification / Internet privacy

          Doubtless Identification and Privacy Pre-serving of User in Cloud Systems Antonio González Robles1 . Norbert Pohlmann1 . Christoph Engling2 . Hubert Jäger3 . Edmund Ernst3 Institute for Internet Security Westfälische

          Add to Reading List

          Source URL: norbert-pohlmann.com

          Language: English - Date: 2015-11-20 14:34:04
          18Computer security / Computer access control / Identity management / Federated identity / Public administration / Open government / Digital identity / Authentication / E-government / National Strategy for Trusted Identities in Cyberspace / Interoperability / EGovernment in Europe

          Microsoft Word - SSEDIC Press Release - Talamo _2_.docx

          Add to Reading List

          Source URL: www.eid-ssedic.eu

          Language: English
          19Security / Biometrics / Prevention / Surveillance / Private biometrics / Fuzzy extractor / Password / Authentication / Facial recognition system / Computer security / Biometric passport / Biometric points

          CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

          Add to Reading List

          Source URL: www.vast.uccs.edu

          Language: English - Date: 2007-10-07 17:21:58
          20Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

          WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

          Add to Reading List

          Source URL: vast.uccs.edu

          Language: English - Date: 2013-12-13 13:04:18
          UPDATE