Authentication

Results: 7063



#Item
981Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan∗ University of Texas at San Antonio ,  Abstract

Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan∗ University of Texas at San Antonio , Abstract

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2015-08-01 03:16:29
    982Towards Secure and Dependable Authentication and Authorization Infrastructures Diego Kreutz, Alysson Bessani Faculdade de Ciências, Universidade de Lisboa, Portugal ,   Abstra

    Towards Secure and Dependable Authentication and Authorization Infrastructures Diego Kreutz, Alysson Bessani Faculdade de Ciências, Universidade de Lisboa, Portugal , Abstra

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2014-08-10 21:56:45
      983Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

      Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

      Add to Reading List

      Source URL: www.entrust.com

      Language: English
      984S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1  Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

      S ILENT K NOCK: Practical, Provably Undetectable Authentication Eugene Y. Vasserman1 , Nicholas Hopper1, John Laxson2 , and James Tyra1 1 Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55455

      Add to Reading List

      Source URL: people.cis.ksu.edu

      Language: English - Date: 2011-07-01 14:16:47
        9851.1 Authentication and Authorization Authentication is the process by which the identity of a user, system, or service is verified. • SUPPLIER Service must interoperate with UNIVERSITY’s Shibboleth IdP (Identity Prov

        1.1 Authentication and Authorization Authentication is the process by which the identity of a user, system, or service is verified. • SUPPLIER Service must interoperate with UNIVERSITY’s Shibboleth IdP (Identity Prov

        Add to Reading List

        Source URL: identity.psu.edu

        Language: English - Date: 2014-11-10 16:21:16
          986LOGO_SECURITYANDTRUSTE_RUSH_36

          LOGO_SECURITYANDTRUSTE_RUSH_36

          Add to Reading List

          Source URL: isc2015.item.ntnu.no

          Language: English - Date: 2015-09-19 12:51:00
          987ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang  Outline

          ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

          Add to Reading List

          Source URL: www.ietf.org

          Language: English - Date: 2013-11-05 13:13:43
          988Adaptive Message Authentication for Vehicular Networks Nikodin Ristanovic Panos Papadimitratos George Theodorakopoulos Jean-Pierre Hubaux Jean-Yves Le Boudec

          Adaptive Message Authentication for Vehicular Networks Nikodin Ristanovic Panos Papadimitratos George Theodorakopoulos Jean-Pierre Hubaux Jean-Yves Le Boudec

          Add to Reading List

          Source URL: users.cs.cf.ac.uk

          Language: English - Date: 2012-09-20 10:46:23
            989Passwords and the Evolution of Imperfect Authentication Joseph Bonneau Stanford University & EFF   Cormac Herley

            Passwords and the Evolution of Imperfect Authentication Joseph Bonneau Stanford University & EFF Cormac Herley

            Add to Reading List

            Source URL: www.jbonneau.com

            Language: English - Date: 2015-08-20 03:12:30
              990Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

              Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

              Add to Reading List

              Source URL: www.fmo.hawaii.edu

              Language: English - Date: 2014-07-21 21:53:18