Knowledge-based authentication

Results: 46



#Item
21Economics / Credit history / Knowledge-based authentication / Credit / Finance / Credit bureau

NOTICE/AUTHORIZATION AND RELEASE FOR THE PROCUREMENT OF A CONSUMER AND/OR INVESTIGATIVE CONSUMER REPORT (PLEASE PRINT OR TYPE) I, the undersigned consumer, do hereby authorize FISK UNIVERSITY by and through an independen

Add to Reading List

Source URL: www.fisk.edu

Language: English - Date: 2014-10-03 17:50:16
22IEEE standards / Password / Zero-knowledge password proof / Challenge-response authentication / IEEE P1363 / Public-key cryptography / Password-authenticated key agreement / Password manager / Cryptography / Security / Cryptographic protocols

IEEE P1363.2: Password-based Cryptography David Jablon CTO, Phoenix Technologies NIST PKI TWG - July 30, 2003

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
23Cryptography / Data security / Passphrase / Authentication / Knowledge-based authentication / Information security / Cognitive password / Password policy / Security / Computer security / Password

Microsoft Word - Jan_2009_Challenge-or-Secret-Questions.doc

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:51
24Knowledge-based authentication / Security / Access control / Identity management / Password policy / Self-service password reset / Password / Computer network security / Computer security

Logon Process for the Virtual Gateway

Add to Reading List

Source URL: www.mass.gov

Language: English - Date: 2013-08-30 23:16:30
25Actuarial science / Risk management / Security / Evaluation / Reliability engineering / Risk assessment / Osama bin Laden / Risk / Management / Ethics

NIST – GSA Symposium Knowledge Based Authentication: Is it Quantifiable? February 9, 2004 Office of National Risk Assessment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
26Password / Usability / Question / Authentication / CAPTCHA / Knowledge-based authentication / Google Answers / Cognitive password / Security / Data collection / Computer security

Personal Choice and Challenge Questions: A Security and Usability Assessment Mike Just David Aspinall

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 19:46:04
27Identity / Access control / Authentication / Notary / Packaging / Identity theft / Privacy / Identity assurance / Information security / Security / Identity management / Ethics

KNOWLEDGE BASED AUTHENTICATION SYMPOSIUM NIST Gaithersburg, Md. February 9, 2004 Thomas M. Regan, Esq.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
28Health Insurance Portability and Accountability Act / Internet privacy / Law / Technology / Government / E-Government / Open government / Public administration

SPH Systems International Knowledge Based Authentication and Privacy Can Standards Help?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
29Web applications / Password / Yahoo! Mail / Knowledge-based authentication / Yahoo! / Software / Computing / World Wide Web

Any questions call Abbey at the Lockport Public Library[removed]. Yahoo! Mail www.mail.com Click here to create

Add to Reading List

Source URL: www.nysl.nysed.gov

Language: English - Date: 2011-02-23 15:29:18
30Credit / Authentication / Notary / Packaging / Computer security / Credential / Knowledge-based authentication / Credit history / Identity management / Security / Access control

Knowledge-Based Authentication Symposium Information Sources and Metrics Authentication Processes & Risk Decisions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
UPDATE