Back to Results
First PageMeta Content
Cryptography / Password / Authentication / One-time password / Multi-factor authentication / Keystroke dynamics / SecurID / Software token / Secure Shell / Security / Computer security / Access control


Authentication Methods and Techniques Christopher Mallow
Add to Reading List

Document Date: 2011-03-10 11:21:17


Open Document

File Size: 191,38 KB

Share Result on Facebook

Company

Centralized Authentication Systems / Novell / Microsoft / /

Event

Person Communication and Meetings / /

Facility

Leavenworth Prison / /

IndustryTerm

early computing / remote protocols / security applications / authentication server / biometric systems / authentication systems / public-key protocols / information technology project / bank / software token / authority server / basic protocols / proper accounting / password systems / security biometric systems / authentication biometric systems / hash algorithm / law enforcement / computing / nuclear missile launch systems / remote-authentication protocols / ultra-high-security applications / /

Movie

Mission /

OperatingSystem

Windows NT / /

Organization

army / /

Person

William West / /

Position

Terminal Access Controller / system administrator / guard / administrator / General / diligent manager / /

Product

Windows NT / /

Technology

encryption / cellular telephone / hash algorithm / public-key protocols / voice recognition / facial recognition / remote-authentication protocols / information technology / GPS / ATM / secret key / secure shell / operating systems / PDA / /

URL

http /

SocialTag