My Account
Computers Security Authentication
62
Authentication is the method a computer uses to ensure that you are who you say you are. Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.
More information

Subcategories 8

Related categories 3

Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
Sells Identity Cues software to help users recognize fake websites through visual reminders linked to user login details.
Computer security consulting and software development company providing computer authentication systems. Headquartered in Calgary, with offices worldwide.
Functions with Internet Information Server to secure web sites. Includes live demo.
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
Specializes in digital identity and anti-fraud solutions that create exceptional and secure experiences.
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques. [PDF]
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
Makers of several related products. Includes rationale as well as usage information.
Sells Identity Cues software to help users recognize fake websites through visual reminders linked to user login details.
Computer security consulting and software development company providing computer authentication systems. Headquartered in Calgary, with offices worldwide.
Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
Specializes in digital identity and anti-fraud solutions that create exceptional and secure experiences.
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques. [PDF]
Makers of several related products. Includes rationale as well as usage information.
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
Functions with Internet Information Server to secure web sites. Includes live demo.
Last update:
October 30, 2023 at 5:35:08 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business