Secure Password Authentication

Results: 177



#Item
1I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E  You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

Add to Reading List

Source URL: www.iwsinc.com

Language: English - Date: 2017-10-18 21:20:11
    2Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

    Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying Hassan Khan, Urs Hengartner, and Daniel Vogel Cheriton School of Computer Science University of Waterloo Waterloo, ON

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 12:56:58
    3SINGLE SIGN ON (SSO) SUPPORT FOR JOIN.ME AUTHENTICATION At join.me, we consider the security of our users a top priority. We integrate with a number of SSO platforms to maintain a highly secure environment without added

    SINGLE SIGN ON (SSO) SUPPORT FOR JOIN.ME AUTHENTICATION At join.me, we consider the security of our users a top priority. We integrate with a number of SSO platforms to maintain a highly secure environment without added

    Add to Reading List

    Source URL: az766929.vo.msecnd.net

    Language: English - Date: 2016-06-20 09:36:34
    4AN EMV MIGRATION FORUM WHITE PAPER  Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

    AN EMV MIGRATION FORUM WHITE PAPER Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

    Add to Reading List

    Source URL: www.emv-connection.com

    Language: English - Date: 2016-08-02 12:07:00
    5eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1  Institute for Internet Security, University of Applied Sciences Gelsenkirchen

    eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: English - Date: 2015-10-20 13:18:07
    6Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

    Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

    Add to Reading List

    Source URL: static.acer.com

    Language: English - Date: 2013-10-24 05:13:45
    7Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

    Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

    Add to Reading List

    Source URL: secure.ifastnetwork.com

    Language: English - Date: 2014-09-25 22:08:54
    8Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

    Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

    Add to Reading List

    Source URL: vast.uccs.edu

    Language: English - Date: 2013-12-13 11:59:39
    9FreeIPA Training Series  SSSD and OpenSSH Integration Jan Cholasta

    FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta

    Add to Reading List

    Source URL: www.freeipa.org

    Language: English - Date: 2013-06-06 07:16:17
    10BNU  MasterCard Debit Card One-Time Password for Your Secure Online Purchases

    BNU MasterCard Debit Card One-Time Password for Your Secure Online Purchases

    Add to Reading List

    Source URL: www.bnu.com.mo

    Language: English - Date: 2015-01-29 21:30:42