Authentication

Results: 7063



#Item
81I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E  You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

I M AGEWA RE ’S M OBILE BIOME T R IC USER AUTHENTICATION SOFTWAR E-AS-A-SERV I C E You become the password. Secure, scalable and flexible. GoVerifyID provides end-to-end, enterprise-ready, mobile biometric user authen

Add to Reading List

Source URL: www.iwsinc.com

Language: English - Date: 2017-10-18 21:20:11
    82sayI: Trusted User Authentication at Internet Scale Jon A. Solworth Wenyuan Fei  University of Illinois at Chicago

    sayI: Trusted User Authentication at Internet Scale Jon A. Solworth Wenyuan Fei University of Illinois at Chicago

    Add to Reading List

    Source URL: www.ethos-os.org

    Language: English - Date: 2017-04-30 19:19:47
      83We Accelerate Growth  www.frost.com Cloud-based Identity and Authentication:

      We Accelerate Growth www.frost.com Cloud-based Identity and Authentication:

      Add to Reading List

      Source URL: www.iwsinc.com

      Language: English - Date: 2016-08-23 14:02:44
        84ZEBRA: Zero-Effort Bilateral Recurring Authentication Shrirang Mare∗ , Andres Molina-Markham∗ , Cory Cornelius† , Ronald Peterson∗ and David Kotz∗ ∗ Institute for Security, Technology, and Society, Dartmouth

        ZEBRA: Zero-Effort Bilateral Recurring Authentication Shrirang Mare∗ , Andres Molina-Markham∗ , Cory Cornelius† , Ronald Peterson∗ and David Kotz∗ ∗ Institute for Security, Technology, and Society, Dartmouth

        Add to Reading List

        Source URL: sharps.org

        Language: English - Date: 2014-07-08 13:27:51
          85The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

          The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption September 29, 2015

          Add to Reading List

          Source URL: www1.spms.ntu.edu.sg

          Language: English - Date: 2015-10-04 23:56:24
            86Study Report on Biometrics in E-Authentication

            Study Report on Biometrics in E-Authentication

            Add to Reading List

            Source URL: www.biosig-id.com

            Language: English - Date: 2016-01-21 00:15:16
              87Towards Kerberizing Web Identity and Services 22 December 2008 Abstract Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. Th

              Towards Kerberizing Web Identity and Services 22 December 2008 Abstract Today authentication and authorization are addressed in an incoherent, and often site-specific, fashion on the Internet and the Web specifically. Th

              Add to Reading List

              Source URL: www.jeffhodges.org

              Language: English - Date: 2012-07-11 18:17:19
                88www.incommon.org  Libraries Combine to Develop Shibboleth-EZproxy Hybrid Combination means a move away from IP authentication; provides greater control Libraries face one of the most complex sit

                www.incommon.org Libraries Combine to Develop Shibboleth-EZproxy Hybrid Combination means a move away from IP authentication; provides greater control Libraries face one of the most complex sit

                Add to Reading List

                Source URL: incommon.org

                Language: English - Date: 2010-10-27 09:19:08
                  89Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi   Jason I. Hong

                  Security through a Different Kind of Obscurity: Evaluating Distortion in Graphical Authentication Schemes Eiji Hayashi Jason I. Hong

                  Add to Reading List

                  Source URL: www.andrew.cmu.edu

                  Language: English - Date: 2018-08-02 14:42:46
                    90Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methods

                    Promoting confi dence in electronic commerce: legal issues on international use of electronic authentication and signature methods

                    Add to Reading List

                    Source URL: www.uncitral.org

                    Language: English - Date: 2009-11-16 08:32:34