Secure Password Authentication

Results: 177



#Item
141Payment systems / Electronic commerce / Personal identification number / Cryptographic nonce / Mobile banking / One-time password / Transaction authentication number / Authentication / Automated teller machine / Technology / Security / Cryptography

Usably Secure, Low-Cost Authentication for Mobile Banking Saurabh Panjwani, Edward Cutrell Microsoft Research India {saurap,cutrell}@microsoft.com ABSTRACT

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-06-22 10:03:22
142Technology / Transaction authentication number / Electronic flight instrument system / Login / Access control / Security / Password

Microsoft Word - Secure Access Registration Form - English.doc

Add to Reading List

Source URL: faab.edu.gov.on.ca

Language: English - Date: 2012-06-12 09:41:47
143Electronic authentication / Authentication / Email / Password / Computing / Security / Identity management / Access control

Secure Access Management Services (SAMS) Electronic Authentication Process for the Inventory Management and Tracking System (IMATS) IMATS - SAMS User Registration Webinar

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2011-09-13 11:35:41
144Password / Transaction authentication number / Authentication / Privileged password management / 3-D Secure / Security / Computer security / Cryptography

Access Online Navigation Basics User Guide Version 2.0 Cardholder

Add to Reading List

Source URL: purchasing.state.nv.us

Language: English - Date: 2013-08-13 15:26:52
145Cryptographic protocols / HTTP / Two-factor authentication / Password / Security token / Keystroke logging / Authentication / HTTP Secure / Transaction authentication number / Security / Cryptography / Computer security

YubiKey Security Evaluation Discussion of security properties and best practices Version: 2.0.1

Add to Reading List

Source URL: static.yubico.com

Language: English - Date: 2012-07-23 09:30:50
146Access control / Password / Access token / Authentication / Login / Security token / Logical security / Security / Cryptography / Two-factor authentication

The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

Add to Reading List

Source URL: www.omh.ny.gov

Language: English - Date: 2011-10-13 14:14:16
147Computer network security / Password / Key management / Kerberos / Ticket Granting Ticket / Salt / Secure Remote Password protocol / Authentication server / Password manager / Cryptography / Computer security / Cyberwarfare

A Real-World Analysis of Kerberos Password Security Thomas Wu Computer Science Department Stanford University [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-10-02 14:08:12
148Cryptographic protocols / HTTP / Two-factor authentication / Password / Security token / Keystroke logging / Authentication / HTTP Secure / Transaction authentication number / Security / Cryptography / Computer security

YubiKey Security Evaluation Discussion of security properties and best practices Version: 2.0.1

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2012-10-03 05:01:08
149Electronic commerce / Authentication / Multi-factor authentication / Phishing / 3-D Secure / Online shopping / Password / Anakam / Security token / Security / Cryptography / Two-factor authentication

FINANCIAL TIMES WEDNESDAY SEPTEMBER[removed]Digital Business | Management & People E-commerce needs better

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:43
150HTTP / Key management / WS-Security / Password / Authentication / HTTP Secure / X.509 / Public key certificate / SAP Logon Ticket / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: www.dgaiec.min-financas.pt

Language: English - Date: 2014-08-18 22:25:37
UPDATE