Authentication

Results: 7063



#Item
91The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes

Add to Reading List

Source URL: oaklandsok.github.io

Language: English - Date: 2018-03-14 15:33:55
    92Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates

    Comodo Authentication Solutions Overview Client Authentication Certificates Two-Factor Authentication Content Verification Certificates

    Add to Reading List

    Source URL: www.instantssl.com

    Language: English - Date: 2017-11-06 10:28:09
      93Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof Naveen Sastry

      Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof Naveen Sastry

      Add to Reading List

      Source URL: www.chriskarlof.com

      Language: English - Date: 2012-01-02 15:39:37
        94Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Antoine Delignat-Lavaud, Karthikeyan Bhargavan, Alfredo Pironti (Prosecco, Inria Paris) Cédric Fournet (Microsoft Research)

        Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS Antoine Delignat-Lavaud, Karthikeyan Bhargavan, Alfredo Pironti (Prosecco, Inria Paris) Cédric Fournet (Microsoft Research)

        Add to Reading List

        Source URL: antoine.delignat-lavaud.fr

        Language: English - Date: 2014-07-18 09:37:09
          95Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1  2

          Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2016-04-12 08:28:30
            96Authentication for Amateur Radio Why We Need It and How To Implement It Bryan Hoyer KG6GEU

            Authentication for Amateur Radio Why We Need It and How To Implement It Bryan Hoyer KG6GEU

            Add to Reading List

            Source URL: microhams.blob.core.windows.net

            - Date: 2015-05-23 18:54:18
              97PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

              PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

              Add to Reading List

              Source URL: mjwilber.org

              - Date: 2015-09-25 13:01:34
                98IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

                IBM Ported Tools for z/OS: OpenSSH Key Authentication June 12,2012 Kirk Wolf Steve Goetze http://dovetail.com

                Add to Reading List

                Source URL: dovetail.com

                - Date: 2012-06-14 11:36:21
                  99API (/api/)  Generated: Wed, 03 Jan:21:03 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

                  API (/api/) Generated: Wed, 03 Jan:21:03 +0000 Authentication (/api/auth) To use the Fastly API you will need to create a valid API token. This token will be used to

                  Add to Reading List

                  Source URL: docs-archive.fastly.com

                  - Date: 2018-04-02 17:41:20
                    100

                    Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

                    Add to Reading List

                    Source URL: www.azbar.org

                    - Date: 2017-05-17 18:29:57