Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Authentication

Index Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. [1]

618 relations: A Twist in the Myth, ABA digital signature guidelines, Aban ibn abi-Ayyash, Access control, Access Control Service, Accreditation, Active Directory, Acuant, Administrative domain, Advising bank, Ahidnâme, Alexander (Zander) Blewett III, Alfresco (software), ANT (network), Antenor Orrego, Anti-Europeanism, Antique, Antique Tribal Art Dealers Association, Apache Shiro, Apache Solr, AppFuse, Application firewall, Application Interface Specification, Application security, Applications of randomness, ARP spoofing, ASP.NET Web Site Administration Tool, Atomic authorization, Attack patterns, Audit Bureau of Jordan, Aurora Generator Test, Auth, Authentication and Key Agreement (protocol), Authentication Open Service Interface Definition, Authentication protocol, Authentication server, Authenticator, Authenticity, Authenticity in art, Authorization, Automatic dependent surveillance – broadcast, Awareness, AWS Lambda, Backbone network, Backdoor (computing), Backhaul (telecommunications), Banking as a Service, Base station subsystem, Batch cryptography, BEEP, ..., Berkeley r-commands, Biometric Consortium, Biometrics, Bitmessage, Blind credential, Block cipher, Block cipher mode of operation, Blockchain, Bluetooth, BMW 1 Series (E87), Bootstrapping, Bootstrapping Server Function, Brand tribalism, Brivo, Broadcast automation, Brunswick stew, BSD Authentication, Burrows–Abadi–Needham logic, CA Technologies, Callback (telecommunications), Card reader, Cave of Zubialde, CCM mode, Certificate policy, Chaffing and winnowing, Challenge-Handshake Authentication Protocol, Challenge–response authentication, Changjiang Securities, CHAOS (operating system), Check Point GO, Checksum, Cheque, Cherokee (web server), Chih-Wei Huang, Chip Authentication Program, Christopher Columbus, CipherSaber, Claris Emailer, Claude Hillaire-Marcel, Closed-loop authentication, Coding theory, Cognitive password, Common Criteria, Common Object Request Broker Architecture, COMP128, Company of Heroes: Opposing Fronts, Comparison of authentication solutions, Comparison of Direct Connect software, Comparison of file transfer protocols, Computational trust, Computer access control, Computer security, Consularization, Contactless smart card, Content analysis, Contesting controversies, Control message, CoSign single sign on, Counterfeit, Counterfeit consumer goods, Counterfeit medications, Counterfeit medicines online, Counterfeit watch, Credential service provider, Credible witness, Crime prevention, Cross-site request forgery, Cross-site tracing, Cryptographic engineering, Cryptographic hash function, Cryptographic key types, Cryptographic Modernization Program, Cryptographic primitive, Cryptographic protocol, Cryptography, Cryptography standards, CryptoVerif, Cultural memory, CUPS, Cyber Mimic Defense, Cyber Secure Asia, Cyber self-defense, CyberTrust, Cyn.in, Database security, DCourseWeb, Debit card, Defense in depth (computing), Delay-tolerant networking, Delegation (computer security), Didiom, Diffie–Hellman key exchange, Digital AMPS, Digital evidence, Digital identity, Digital security, Digital signature, Digital Signature and Electronic Authentication Law, Digital subscriber line, Disk encryption, Distributed Access Control System, Distributed Computing Environment, Distributed social network, DNAS, DOCSIS, Documentary evidence, Domain Name System, Domain Name System Security Extensions, DomainKeys Identified Mail, Double Ratchet Algorithm, Drizzle (database server), Drug packaging, DRYAD, DS Logon, Dynamic secrets, E-commerce identification and identification types, EAuthentication, EAX mode, Echo (communications protocol), Eduroam, EFx Factory, EGovernment in Europe, EIDAS, Electronic identification, Electronic lock, Electronic Signatures in Global and National Commerce Act, Email authentication, Email encryption, Email hacking, Email spam, Emotional support animal, Encrypting File System, Encrypting PIN Pad, End node problem, Enemy, Entersekt, Epistles (Plato), Eschatocol, Event Viewer, Evidence (law), Executable UML, Exemplified copy, Expertization, Extended matching items, Extended SMTP, EZproxy, F for Fake, F5 Networks, Facial recognition system, Factor, Factotum (software), Fake passport, Fast and Secure Protocol, FCAPS, Federated identity, FeliCa, Field-programmable gate array, Fifth Letter (Plato), Fingerprint, First Letter (Plato), Food packaging, Forgery, ForgetMeNot Software, Form (HTML), Form-based authentication, Formalities in English law, Foswiki, FreeLAN, Friend-to-friend, Front and back ends, FuelPHP, Fuzzy extractor, G.hn, Gamification, GateKeeper (access control device), General Inter-ORB Protocol, Generic Security Services Application Program Interface, Gerald Clarke (artist), Giesecke & Devrient, Google APIs, Google Play Services, GoToMeeting, GoToTraining, Graue Mill, Gustavus Simmons, H.235, Hardware-based full disk encryption, Hash chain, HealthCare.gov, Hiawatha (web server), HiperLAN, Historic Spanish Point, Historical fiction, Historical romance, HMAC, Hotspot (Wi-Fi), Hotspot gateway, HTTP+HTML form-based authentication, HTTPS, HTTPsec, Human rights and encryption, Hypothesis, IAPM (mode), Ibanez JEM, IBM Blueworks Live, IBM Lightweight Third-Party Authentication, IBM Tivoli Access Manager, IBM Tivoli Directory Server, IBM WebSphere Application Server Community Edition, IBM WebSphere Service Registry and Repository Feature Pack for Service Federation Management, ID-based encryption, Identification (information), Identity 2.0, Identity driven networking, Identity management, Identity score, Identity-based security, Idex ASA, IEC 60870-6, IEEE 802.1X, IEEE 802.21, IEEE 802.22, Index of cryptography articles, Index of Internet-related articles, Information privacy, Information security, Information technology specialist (military), Initialization vector, Intel Active Management Technology, Intelligence source and information reliability, Internet, Internet Information Services, Internet Printing Protocol, Internet security, Intrusion detection system, IP address spoofing, IP Multimedia Subsystem, IPsec, ISMACryp, ISO/IEC 19794-5, ISO/IEC 24727, ISO/IEC 27040, Jack Dorsey, Jack Ogden (jewellery historian), Java Authentication and Authorization Service, Java Secure Socket Extension, Jay's Journal, Jeong Yim, Jerry Sandusky, Joe job, Joel H. Johnson, John Evans (supercentenarian), Kenneth Arrow, Kenneth P. Weiss, Kennitala, Kerberos (protocol), Key selection vector, Kondō Isami, L-1 Identity Solutions, Label, Land diving, Laravel, Legal instrument, Levels of identity security, Lightweight Directory Access Protocol, Lightweight Extensible Authentication Protocol, Linked timestamping, List of CDMA terminology, List of computer term etymologies, List of cryptographers, List of HTTP status codes, List of important publications in cryptography, Local eGovernment, Location-based authentication, LocationSmart, Log analysis, Logical access control, Logical security, LogicalDOC, Login, Login manager, Lucien Wolf, Luxury packaging, Magic cookie, Malware, Managed services, Manu propria, Maui Fever, Medium of exchange, Message authentication, Message forgery, Microsoft CryptoAPI, Microsoft Live Labs, MIFARE, Minos (dialogue), MMH-Badger MAC, Mobile app, Mobile banking, Mobile business intelligence, Mobile identity management, Mobile virtual private network, Mobility management, Moose File System, Moti Yung, Mouse tracking, Mozilla, Mozilla Persona, MQV, Multi-factor authentication, Munax, Mutual authentication, Mykola Melnychenko, NaCl (software), Naor–Reingold pseudorandom function, NAT Port Mapping Protocol, National Digital Preservation Program, National Police Computing and Material Service (Norway), Nationwide Suspicious Activity Reporting Initiative, Needham–Schroeder protocol, Network Access Control, Network Computer Reference Profile, Network Information Service, Network security, Network switching subsystem, Neuman–Stubblebine protocol, New World Order (conspiracy theory), Next-Generation Secure Computing Base, Nicholas Forrest, Nok Nok Labs, Non-commutative cryptography, Norwegian Police Service, Norwegian Public Safety Network, NSA encryption systems, NuFW, Null encryption, OASIS (organization), Off-the-Record Messaging, On-board diagnostics, One-time pad, One-way function, Online banking, Online identity, Open mail relay, Open Web Interface for .NET, OpenAM, OpenID, OpenID Connect, OpenPGP card, OpenSC, OpenSSH, OpenVPN, Oracle Adaptive Access Manager, Orkut, OTPW, Otway–Rees protocol, OurTunes, Out of wallet, Outline of computer security, Outline of cryptography, Overwrap, Package pilferage, Packaging and labeling, Parental controls, PassMap, Password, PEAR, Peter Landrock, Pharming, Photo identification, PhpBB, Pindrop Security, Plesk, Pluggable authentication module, Point-to-Point Protocol, Point-to-Point Protocol over ATM, Point-to-Point Protocol over Ethernet, Point-to-Point Tunneling Protocol, Policy appliances, POP before SMTP, Port Control Protocol, Portrait of a Young Man with a Golden Chain, Post Office Protocol, Postage stamps and postal history of Cuba, PRADO (framework), Pretty Good Privacy, Provenance, Proxy server, Public eProcurement, Public key infrastructure, Public-key cryptography, Pull printing, Qualified digital certificate, Questioned document examination, QVD (software), Race condition, Radio-frequency identification, RADIUS, Rainbow table, Real evidence, Real ID Act, Redmine, Referer spoofing, Reflection attack, Reliance authentication, Remote Shell, Replay attack, Reptile (software), RIFE, Risk-based authentication, Roaming, Rockstar Games, Roger Needham, Rootkit, S/KEY, S/MIME, Safelayer Secure Communications, SafeNet, Samhain (software), SAML 1.1, SAML 2.0, São Paulo Museum of Art, Seal (contract law), Seal (emblem), Seal of the United States Senate, Sealed server, Secure access module, Secure by default, Secure communication, Secure cryptoprocessor, Secure messaging, Secure Real-time Transport Protocol, Secure Shell, Secure Socket Tunneling Protocol, Secure telephone, Secure-adaptive architecture, Security and safety features new to Windows Vista, Security as a service, Security Assertion Markup Language, Security bag, Security bug, Security engineering, Security printing, Security Support Provider Interface, Security tape, Security token, Security-focused operating system, Self-certifying File System, Self-service password reset, Separation of duties, Server Message Block, Server-based signatures, Service authentication, Service-oriented programming, Session Announcement Protocol, Session hijacking, Session layer, Shell Control Box, Shibboleth (Shibboleth Consortium), Shoulder surfing (computer security), Signcryption, Signing of the United States Constitution, Simple Authentication and Security Layer, Simple Mail Transfer Protocol, Simple Network Management Protocol, Single sign-on, Single-page application, SIP extensions for the IP Multimedia Subsystem, Situated learning, SlickLogin, Smart card, Smart key, Smart Personal Objects Technology, Smartmatic, SmoothWall, SMS, SMTPS, Social login, Social Security number, SOCKS, Software token, SPIP, SPNEGO, Spring Framework, Spring Security, SQRL, SquidGuard, SSL-Explorer: Community Edition, SSLIOP, Storage Resource Broker, StrongSwan, Superuser, SURFnet, System Security Services Daemon, Systems engineering, TCP reset attack, Tcpcrypt, Telegram (service), Telephone banking, Tenth Letter (Plato), Text to speech in digital television, The Bat!, The Beast (Revelation), Theoretical computer science, ThinkPad Tablet, Third-party grading, Three-pass protocol, Ticket (IT security), Ticket Granting Ticket, Time-based authentication, TLS-PSK, Transaction authentication number, Translating for legal equivalence, Trillian (software), Trust service provider, Trusted Platform Module, Twelfth Letter, TWiki, UMTS security, United States Constitution, Univention Corporate Server, Universal composability, Universal Plug and Play, University Computing Centre, University of Cambridge Computing Service, University of Rochester, Unverified personal gnosis, Usability of web authentication systems, User (computing), V-Key, Vadim the Bold, Validation of foreign studies and degrees, ValidSoft, Value judgment, Vapor (web framework), Verification, Verification and validation, Virtual private network, Voice over IP, VQP, Weak key, Weapons of the Vietnam War, Web access management, Web API security, Web archiving, Web browsing history, Web cryptography API, Web framework, Web of trust, Web Services Discovery, Web2py, WebID, Wide Mouth Frog protocol, Wiki, Windows Media Services, Wireless Broadband Alliance, Wireless lock, Wireless network interface controller, Wireless security, Wireless WAN, Woo–Lam, X Window System core protocol, XPS Annotator, XTS-400, Zero-knowledge password proof, Zero-knowledge proof, .htaccess, 24 (season 2), 3GPP. Expand index (568 more) »

A Twist in the Myth

A Twist in the Myth is the eighth studio album by the German heavy metal band Blind Guardian.

New!!: Authentication and A Twist in the Myth · See more »

ABA digital signature guidelines

The ABA digital signature guidelines are a set of guidelines published on 1 August 1996 by the American Bar Association (ABA) Section of Science and Technology Law.

New!!: Authentication and ABA digital signature guidelines · See more »

Aban ibn abi-Ayyash

Ābān ibn Abī-'Ayyāsh was a Persian companion of Sulaym ibn Qays and several Shi'a Imams.

New!!: Authentication and Aban ibn abi-Ayyash · See more »

Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource.

New!!: Authentication and Access control · See more »

Access Control Service

Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of authenticating and authorizing users to gain access to web applications and services while allowing the features of authentication and authorization to be factored out of the application code.

New!!: Authentication and Access Control Service · See more »

Accreditation

Accreditation is the process in which certification of competency, authority, or credibility is presented.

New!!: Authentication and Accreditation · See more »

Active Directory

Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks.

New!!: Authentication and Active Directory · See more »

Acuant

Acuant is an identity verification, document authentication and fraud prevention technology services provider headquartered in Los Angeles, with engineering and development centers in New Hampshire and Israel.

New!!: Authentication and Acuant · See more »

Administrative domain

An administrative domain is a service provider holding a security repository permitting to easily authenticate and authorize clients with credentials.

New!!: Authentication and Administrative domain · See more »

Advising bank

An advising bank (also known as a notifying bank) advises a beneficiary (exporter) that a letter of credit (L/C) opened by an issuing bank for an applicant (importer) is available.

New!!: Authentication and Advising bank · See more »

Ahidnâme

An Ahdname, achtiname or ahidnâme (meaning "the Bill of Oath") is a type of Ottoman charter commonly referred to as a capitulation.

New!!: Authentication and Ahidnâme · See more »

Alexander (Zander) Blewett III

Alexander (Zander) Blewett III (born 1945) is a Montana personal injury lawyer based out of Great Falls, Montana.

New!!: Authentication and Alexander (Zander) Blewett III · See more »

Alfresco (software)

Alfresco is a collection of information management software products for Microsoft Windows and Unix-like operating systems developed using Java technology.

New!!: Authentication and Alfresco (software) · See more »

ANT (network)

ANT is a proprietary (but open access) multicast wireless sensor network technology designed and marketed by ANT Wireless (a division of Dynastream Innovations, in turn a wholly owned subsidiary of Garmin).

New!!: Authentication and ANT (network) · See more »

Antenor Orrego

Antenor Orrego Espinoza (22 May 1892 – 17 July 1960) was a Peruvian writer and political philosopher of Basque ancestry.

New!!: Authentication and Antenor Orrego · See more »

Anti-Europeanism

Anti-Europeanism and Europhobia are political terms used in a variety of contexts, implying sentiment or policies in opposition to "Europe".

New!!: Authentication and Anti-Europeanism · See more »

Antique

A true antique (antiquus; "old", "ancient") is an item perceived as having value because of its aesthetic or historical significance, and often defined as at least 100 years old (or some other limit), although the term is often used loosely to describe any objects that are old.

New!!: Authentication and Antique · See more »

Antique Tribal Art Dealers Association

The Antique Tribal Art Dealers Association (ATADA), was founded in 1988, by a group of independent antique tribal art dealers to form a professional association of dealers that would provide education for the public and set standards for the trade.

New!!: Authentication and Antique Tribal Art Dealers Association · See more »

Apache Shiro

Apache Shiro (pronounced "sheeroh", a Japanese word for castle) is an open source software security framework that performs authentication, authorization, cryptography and session management.

New!!: Authentication and Apache Shiro · See more »

Apache Solr

Solr (pronounced "solar") is an open source enterprise search platform, written in Java, from the Apache Lucene project.

New!!: Authentication and Apache Solr · See more »

AppFuse

AppFuse is an open-source Java EE web application framework.

New!!: Authentication and AppFuse · See more »

Application firewall

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service.

New!!: Authentication and Application firewall · See more »

Application Interface Specification

The Application Interface Specification (AIS) is a collection of open specifications that define the application programming interfaces (APIs) for high-availability application computer software.

New!!: Authentication and Application Interface Specification · See more »

Application security

Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities.

New!!: Authentication and Application security · See more »

Applications of randomness

Randomness has many uses in science, art, statistics, cryptography, gaming, gambling, and other fields.

New!!: Authentication and Applications of randomness · See more »

ARP spoofing

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.

New!!: Authentication and ARP spoofing · See more »

ASP.NET Web Site Administration Tool

ASP.NET Web Site Administration Tool is a utility provided along with Microsoft Visual Studio which assists in the configuration and administration of a website created using Microsoft Visual Studio 2005 and later versions.

New!!: Authentication and ASP.NET Web Site Administration Tool · See more »

Atomic authorization

Atomic authorization is the act of securing authorization rights independently from the intermediary applications to which they are granted and the parties to which they apply.

New!!: Authentication and Atomic authorization · See more »

Attack patterns

In computer science, attack patterns are a group of rigorous methods for finding bugs or errors in code related to computer security.

New!!: Authentication and Attack patterns · See more »

Audit Bureau of Jordan

Audit Bureau of Jordan is an independent Government agency and a supreme audit institution which is responsible for auditing the ministries, public institutions, public departments, municipalities, co-operatives, labor unions, corporations where Government of Jordan has more than 50% of their shares, and any entity the Council of Ministers may entrust the Bureau to audit its accounts.

New!!: Authentication and Audit Bureau of Jordan · See more »

Aurora Generator Test

Idaho National Laboratory ran the Aurora Generator Test in 2007 to demonstrate how a cyberattack could destroy physical components of the electric grid.

New!!: Authentication and Aurora Generator Test · See more »

Auth

Auth or AUTH has multiple meanings.

New!!: Authentication and Auth · See more »

Authentication and Key Agreement (protocol)

AKA stands for the Authentication and Key Agreement.

New!!: Authentication and Authentication and Key Agreement (protocol) · See more »

Authentication Open Service Interface Definition

The Authentication Open Service Interface Definition (OSID) is an O.K.I. specification which supports invoking an authentication process.

New!!: Authentication and Authentication Open Service Interface Definition · See more »

Authentication protocol

An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities.

New!!: Authentication and Authentication protocol · See more »

Authentication server

An authentication server provides a network service that applications use to authenticate the credentials, usually account names and passwords, of their users.

New!!: Authentication and Authentication server · See more »

Authenticator

An authenticator is a way to prove to a computer system that you really are who you are (called authentication).

New!!: Authentication and Authenticator · See more »

Authenticity

Authenticity or authentic may refer to.

New!!: Authentication and Authenticity · See more »

Authenticity in art

Authenticity in art is the different ways in which a work of art or an artistic performance may be considered authentic.

New!!: Authentication and Authenticity in art · See more »

Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Authentication and Authorization · See more »

Automatic dependent surveillance – broadcast

Automatic dependent surveillance — broadcast (ADS–B) is a surveillance technology in which an aircraft determines its position via satellite navigation and periodically broadcasts it, enabling it to be tracked.

New!!: Authentication and Automatic dependent surveillance – broadcast · See more »

Awareness

Awareness is the ability to directly know and perceive, to feel, or to be cognizant of events.

New!!: Authentication and Awareness · See more »

AWS Lambda

AWS Lambda is an event-driven, serverless computing platform provided by Amazon as a part of the Amazon Web Services.

New!!: Authentication and AWS Lambda · See more »

Backbone network

A backbone is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.

New!!: Authentication and Backbone network · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Authentication and Backdoor (computing) · See more »

Backhaul (telecommunications)

In a hierarchical telecommunications network the backhaul portion of the network comprises the intermediate links between the core network, or backbone network, and the small subnetworks at the "edge" of the entire hierarchical network.

New!!: Authentication and Backhaul (telecommunications) · See more »

Banking as a Service

Banking as a Service (BaaS) (also: Banking-as-a-Service) is an end-to-end process ensuring the overall execution of a financial service provided over the Web.

New!!: Authentication and Banking as a Service · See more »

Base station subsystem

The base station subsystem (BSS) is the section of a traditional cellular telephone network which is responsible for handling traffic and signaling between a mobile phone and the network switching subsystem.

New!!: Authentication and Base station subsystem · See more »

Batch cryptography

Batch cryptography is the area of cryptology where cryptographic protocols are studied and developed for doing cryptographic processes like encryption/decryption, key exchange, authentication, etc.

New!!: Authentication and Batch cryptography · See more »

BEEP

The Blocks Extensible Exchange Protocol (BEEP) is a framework for creating network application protocols.

New!!: Authentication and BEEP · See more »

Berkeley r-commands

The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.

New!!: Authentication and Berkeley r-commands · See more »

Biometric Consortium

The Biometric Consortium is a US government sponsored consortium created by the National Security Agency (NSA) and the National Institute of Standards and Technology (NIST).

New!!: Authentication and Biometric Consortium · See more »

Biometrics

Biometrics is the technical term for body measurements and calculations.

New!!: Authentication and Biometrics · See more »

Bitmessage

Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communications protocol that can be used by one person to send encrypted messages to another person, or to multiple subscribers.

New!!: Authentication and Bitmessage · See more »

Blind credential

A blind credential is a token asserting that someone qualifies under some criteria or has some status or right, without revealing "who" that person is — without including their name or address, for instance.

New!!: Authentication and Blind credential · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Authentication and Block cipher · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: Authentication and Block cipher mode of operation · See more »

Blockchain

A blockchain, originally block chain, is a continuously growing list of records, called blocks, which are linked and secured using cryptography.

New!!: Authentication and Blockchain · See more »

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485GHz) from fixed and mobile devices, and building personal area networks (PANs).

New!!: Authentication and Bluetooth · See more »

BMW 1 Series (E87)

The BMW E81/E82/E87/E88 is the first generation of the BMW 1 Series range of small hatchback, coupe and convertible cars, which were produced from 2004 to 2013.

New!!: Authentication and BMW 1 Series (E87) · See more »

Bootstrapping

In general, bootstrapping usually refers to a self-starting process that is supposed to proceed without external input.

New!!: Authentication and Bootstrapping · See more »

Bootstrapping Server Function

A Bootstrapping Server Function (BSF) is an intermediary element in Cellular networks which provides application independent functions for mutual authentication of user equipment and servers unknown to each other and for 'bootstrapping' the exchange of secret session keys afterwards.

New!!: Authentication and Bootstrapping Server Function · See more »

Brand tribalism

A brand tribe is a group of people who are linked by a shared belief around a brand.

New!!: Authentication and Brand tribalism · See more »

Brivo

Brivo, Inc. is a company providing cloud-based access control and video surveillance products for physical security and internet of things applications.

New!!: Authentication and Brivo · See more »

Broadcast automation

Broadcast automation incorporates the use of broadcast programming technology to automate broadcasting operations.

New!!: Authentication and Broadcast automation · See more »

Brunswick stew

Brunswick stew is a traditional dish, popular in the American South, generally involving a tomato base, local beans, vegetables, and originally small game meat, though today often chicken.

New!!: Authentication and Brunswick stew · See more »

BSD Authentication

BSD Authentication, otherwise known as BSD Auth, is an authentication framework and software API employed by OpenBSD and accompanying software such as OpenSSH.

New!!: Authentication and BSD Authentication · See more »

Burrows–Abadi–Needham logic

Burrows–Abadi–Needham logic (also known as the BAN logic) is a set of rules for defining and analyzing information exchange protocols.

New!!: Authentication and Burrows–Abadi–Needham logic · See more »

CA Technologies

CA Technologies, formerly known as Computer Associates International, Inc. and CA, Inc., is an American multinational publicly held corporation headquartered in New York City.

New!!: Authentication and CA Technologies · See more »

Callback (telecommunications)

In telecommunications, a callback or call-back occurs when the originator of a call is immediately called back in a second call as a response.

New!!: Authentication and Callback (telecommunications) · See more »

Card reader

A card reader is a data input device that reads data from a card-shaped storage medium.

New!!: Authentication and Card reader · See more »

Cave of Zubialde

Cave of Zubialde is a prehistoric cave located in Zubialde, Gorbea, Spain.

New!!: Authentication and Cave of Zubialde · See more »

CCM mode

CCM mode (Counter with CBC-MAC) is a mode of operation for cryptographic block ciphers.

New!!: Authentication and CCM mode · See more »

Certificate policy

A certificate policy (CP) is a document which aims to state what are the different entities of a public key infrastructure (PKI), their roles and their duties.

New!!: Authentication and Certificate policy · See more »

Chaffing and winnowing

Chaffing and winnowing is a cryptographic technique to achieve confidentiality without using encryption when sending data over an insecure channel.

New!!: Authentication and Chaffing and winnowing · See more »

Challenge-Handshake Authentication Protocol

In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity.

New!!: Authentication and Challenge-Handshake Authentication Protocol · See more »

Challenge–response authentication

In computer security, challenge–response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

New!!: Authentication and Challenge–response authentication · See more »

Changjiang Securities

Changjiang Securities Company Limited is a securities company headquartered in Wuhan, Hubei, China.

New!!: Authentication and Changjiang Securities · See more »

CHAOS (operating system)

CHAOS is a small (6Mbyte) Linux distribution designed for creating ad hoc computer clusters.

New!!: Authentication and CHAOS (operating system) · See more »

Check Point GO

Check Point GO is a USB drive that combines an encrypted USB flash drive with virtualization, VPN and computer security technologies to turn a PC into a secure corporate desktop.

New!!: Authentication and Check Point GO · See more »

Checksum

A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage.

New!!: Authentication and Checksum · See more »

Cheque

A cheque, or check (American English; see spelling differences), is a document that orders a bank to pay a specific amount of money from a person's account to the person in whose name the cheque has been issued.

New!!: Authentication and Cheque · See more »

Cherokee (web server)

Cherokee is an open-source cross-platform web server that runs on Linux, BSD variants, Solaris,, and Windows.

New!!: Authentication and Cherokee (web server) · See more »

Chih-Wei Huang

Chih-Wei Huang (黃志偉) is a developer and promoter of free software who lives in Taiwan.

New!!: Authentication and Chih-Wei Huang · See more »

Chip Authentication Program

A Gemalto EZIO CAP device with Barclays PINsentry styling The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and telephone banking.

New!!: Authentication and Chip Authentication Program · See more »

Christopher Columbus

Christopher Columbus (before 31 October 145120 May 1506) was an Italian explorer, navigator, and colonizer.

New!!: Authentication and Christopher Columbus · See more »

CipherSaber

CipherSaber is a simple symmetric encryption protocol based on the RC4 stream cipher.

New!!: Authentication and CipherSaber · See more »

Claris Emailer

Claris Emailer (often stylized as Claris Em@iler) is a discontinued e-mail client for the classic Mac OS created by Fog City Software.

New!!: Authentication and Claris Emailer · See more »

Claude Hillaire-Marcel

Claude Hillaire-Marcel FRSC (born April 1, 1944 in Salies-de-Béarn, Pyrénées-Atlantiques) is a Canadian geoscientist working in Quaternary research.

New!!: Authentication and Claude Hillaire-Marcel · See more »

Closed-loop authentication

Closed-loop authentication, as applied to computer network communication, refers to a mechanism whereby one party verifies the purported identity of another party by requiring them to supply a copy of a token transmitted to the canonical or trusted point of contact for that identity.

New!!: Authentication and Closed-loop authentication · See more »

Coding theory

Coding theory is the study of the properties of codes and their respective fitness for specific applications.

New!!: Authentication and Coding theory · See more »

Cognitive password

A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know, to verify their identity.

New!!: Authentication and Cognitive password · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

New!!: Authentication and Common Criteria · See more »

Common Object Request Broker Architecture

The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) designed to facilitate the communication of systems that are deployed on diverse platforms.

New!!: Authentication and Common Object Request Broker Architecture · See more »

COMP128

The COMP128 algorithms are implementations of the A3 and A8 algorithms defined in the GSM standard.

New!!: Authentication and COMP128 · See more »

Company of Heroes: Opposing Fronts

Company of Heroes: Opposing Fronts (abbreviated CoH:OF) is the stand alone expansion pack to Company of Heroes, a real-time strategy game for computers running the Windows operating system.

New!!: Authentication and Company of Heroes: Opposing Fronts · See more »

Comparison of authentication solutions

Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity.

New!!: Authentication and Comparison of authentication solutions · See more »

Comparison of Direct Connect software

This article compares features and other data about client and server software for Direct Connect, a peer-to-peer file sharing protocol.

New!!: Authentication and Comparison of Direct Connect software · See more »

Comparison of file transfer protocols

This article lists communication protocols that are designed for file transfer over a telecommunications network.

New!!: Authentication and Comparison of file transfer protocols · See more »

Computational trust

In information security, computational trust is the generation of trusted authorities or user trust through cryptography.

New!!: Authentication and Computational trust · See more »

Computer access control

In computer security, general access control includes identification, authorization, authentication, access approval, and audit.

New!!: Authentication and Computer access control · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Authentication and Computer security · See more »

Consularization

In international law, consularization is the act of authenticating any legal document by the consul office, by the consul signing and affixing a red ribbon to the document.

New!!: Authentication and Consularization · See more »

Contactless smart card

A contactless smart card is a contactless credential whose dimensions are credit-card size.

New!!: Authentication and Contactless smart card · See more »

Content analysis

Content analysis is a research method for studying documents and communication artifacts, which might be texts of various formats, pictures, audio or video.

New!!: Authentication and Content analysis · See more »

Contesting controversies

Like most other sports, amateur radio contesting has its share of disputes and controversy.

New!!: Authentication and Contesting controversies · See more »

Control message

Control messages are a special kind of Usenet post that are used to control news servers.

New!!: Authentication and Control message · See more »

CoSign single sign on

Cosign is an open source project originally designed by the Research Systems Unix Group to provide the University of Michigan with a secure single sign-on web authentication system.

New!!: Authentication and CoSign single sign on · See more »

Counterfeit

The counterfeit means to imitate something.

New!!: Authentication and Counterfeit · See more »

Counterfeit consumer goods

Counterfeit consumer goods are goods, often of inferior quality, made or sold under another's brand name without the brand owner’s authorization.

New!!: Authentication and Counterfeit consumer goods · See more »

Counterfeit medications

A counterfeit medication or a counterfeit drug is a medication or pharmaceutical product which is produced and sold with the intent to deceptively represent its origin, authenticity or effectiveness.

New!!: Authentication and Counterfeit medications · See more »

Counterfeit medicines online

The online distribution of counterfeit medicines has been growing during the last decades.

New!!: Authentication and Counterfeit medicines online · See more »

Counterfeit watch

A counterfeit watch is an illegal copy of an authentic watch.

New!!: Authentication and Counterfeit watch · See more »

Credential service provider

A Credential Service Provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers.

New!!: Authentication and Credential service provider · See more »

Credible witness

In the law of evidence, a credible witness is a person making testimony in a court or other tribunal, or acting otherwise as a witness, whose credibility is unimpeachable.

New!!: Authentication and Credible witness · See more »

Crime prevention

Crime prevention is the attempt to reduce and deter crime and criminals.

New!!: Authentication and Crime prevention · See more »

Cross-site request forgery

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.

New!!: Authentication and Cross-site request forgery · See more »

Cross-site tracing

In web security, cross-site tracing (abbreviated "XST") is a network security vulnerability exploiting the HTTP TRACE method.

New!!: Authentication and Cross-site tracing · See more »

Cryptographic engineering

Cryptographic Engineering is the discipline of using cryptography to solve human problems.

New!!: Authentication and Cryptographic engineering · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Authentication and Cryptographic hash function · See more »

Cryptographic key types

A cryptographic key is a string of data that is used to lock or unlock cryptographic functions, including authentication, authorization and encryption.

New!!: Authentication and Cryptographic key types · See more »

Cryptographic Modernization Program

The Cryptographic Modernization Program is a Department of Defense directed, NSA Information Assurance Directorate led effort to transform and modernize Information Assurance capabilities for the 21st century.

New!!: Authentication and Cryptographic Modernization Program · See more »

Cryptographic primitive

Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems.

New!!: Authentication and Cryptographic primitive · See more »

Cryptographic protocol

A security protocol (cryptographic protocol or encryption protocol) is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences of cryptographic primitives.

New!!: Authentication and Cryptographic protocol · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Authentication and Cryptography · See more »

Cryptography standards

There are a number of standards related to cryptography.

New!!: Authentication and Cryptography standards · See more »

CryptoVerif

CryptoVerif is a software tool for the automatic reasoning about security protocols written by Bruno Blanchet.

New!!: Authentication and CryptoVerif · See more »

Cultural memory

Because memory is not just an individual, private experience but is also part of the collective domain, cultural memory has become a topic in both historiography (Pierre Nora, Richard Terdiman) and cultural studies (e.g., Susan Stewart).

New!!: Authentication and Cultural memory · See more »

CUPS

CUPS (formerly an acronym for Common UNIX Printing System) is a modular printing system for Unix-like computer operating systems which allows a computer to act as a print server.

New!!: Authentication and CUPS · See more »

Cyber Mimic Defense

From the inspiration of defensive guise behaviors based on mimic phenomenon in biology, Cyber Mimic Defense (CMD) introduces the mechanism of dynamic multi-dimensional reconfiguration into a dissimilar redundancy structure (DRS) which is widely used in the field of reliability.

New!!: Authentication and Cyber Mimic Defense · See more »

Cyber Secure Asia

Cyber Secure Asia (CSA) is a wholly owned subsidiary of CyberTrust Japan, a pioneer in Japan’s security certification market for 20 years.

New!!: Authentication and Cyber Secure Asia · See more »

Cyber self-defense

Cyber self-defense refers to self-defense in cybersecurity to defend against cyberattack.

New!!: Authentication and Cyber self-defense · See more »

CyberTrust

CyberTrust was a security services company formed in Virginia in November 2004 from the merger of TruSecure and Betrusted.

New!!: Authentication and CyberTrust · See more »

Cyn.in

Cyn.in is an open source enterprise collaborative software built on top of Plone a content management system written in the Python programming language which is a layer above Zope.

New!!: Authentication and Cyn.in · See more »

Database security

Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

New!!: Authentication and Database security · See more »

DCourseWeb

dCourseWeb is an Internet-based application designed by Nazarene Bible College (NBC) to manage online education programs.

New!!: Authentication and DCourseWeb · See more »

Debit card

A debit card (also known as a bank card, plastic card or check card) is a plastic payment card that can be used instead of cash when making purchases.

New!!: Authentication and Debit card · See more »

Defense in depth (computing)

Defense in depth (also known as Castle Approach) is an information assurance (IA) concept in which multiple layers of security controls (defense) are placed throughout an information technology (IT) system.

New!!: Authentication and Defense in depth (computing) · See more »

Delay-tolerant networking

Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity.

New!!: Authentication and Delay-tolerant networking · See more »

Delegation (computer security)

Delegation is the process of a computer user handing over their authentication credentials to another user.

New!!: Authentication and Delegation (computer security) · See more »

Didiom

Didiom was a digital media company that specialized in the development of streaming media applications and wireless content delivery platforms.

New!!: Authentication and Didiom · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: Authentication and Diffie–Hellman key exchange · See more »

Digital AMPS

IS-54 and IS-136 are second-generation (2G) mobile phone systems, known as Digital AMPS (D-AMPS), and a further development of the north-American 1G mobile system AMPS.

New!!: Authentication and Digital AMPS · See more »

Digital evidence

Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial.

New!!: Authentication and Digital evidence · See more »

Digital identity

A digital identity is information on an entity used by computer systems to represent an external agent.

New!!: Authentication and Digital identity · See more »

Digital security

Internet security involves the protection of a computer's internet account and files from intrusion by an outside user.

New!!: Authentication and Digital security · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Authentication and Digital signature · See more »

Digital Signature and Electronic Authentication Law

Digital Signature And Electronic Authentication Law (SEAL) of 1998 was introduced to the United States Senate, as S.1594, and was followed closely by H.R. 3472 which was introduced to the House of Representatives.

New!!: Authentication and Digital Signature and Electronic Authentication Law · See more »

Digital subscriber line

Digital subscriber line (DSL; originally digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.

New!!: Authentication and Digital subscriber line · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Authentication and Disk encryption · See more »

Distributed Access Control System

Distributed Access Control System (DACS) is a light-weight single sign-on and attribute-based access control system for web servers and server-based software.

New!!: Authentication and Distributed Access Control System · See more »

Distributed Computing Environment

In computing, the Distributed Computing Environment (DCE) software system was developed in the early 1990s from the work of the Open Software Foundation (OSF), a consortium (founded in 1988) that included Apollo Computer (part of Hewlett-Packard from 1989), IBM, Digital Equipment Corporation, and others.

New!!: Authentication and Distributed Computing Environment · See more »

Distributed social network

A distributed social network or federated social network is an Internet social networking service that is decentralized and distributed across distinct providers (something like email but for social networks).

New!!: Authentication and Distributed social network · See more »

DNAS

Dynamic Network Authentication System (DNAS) was a proprietary authentication system created by Sony Computer Entertainment Inc.

New!!: Authentication and DNAS · See more »

DOCSIS

Data Over Cable Service Interface Specification (DOCSIS) is an international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable TV (CATV) system.

New!!: Authentication and DOCSIS · See more »

Documentary evidence

Documentary evidence is any evidence that is, or can be, introduced at a trial in the form of documents, as distinguished from oral testimony.

New!!: Authentication and Documentary evidence · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Authentication and Domain Name System · See more »

Domain Name System Security Extensions

The Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks.

New!!: Authentication and Domain Name System Security Extensions · See more »

DomainKeys Identified Mail

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing.

New!!: Authentication and DomainKeys Identified Mail · See more »

Double Ratchet Algorithm

In cryptography, the Double Ratchet Algorithm (previously referred to as the Axolotl Ratchet) is a key management algorithm that was developed by Trevor Perrin and Moxie Marlinspike in 2013.

New!!: Authentication and Double Ratchet Algorithm · See more »

Drizzle (database server)

Drizzle is an abandoned free software/open source relational database management system (DBMS) that was forked from the now-defunct 6.0 development branch of the MySQL DBMS.

New!!: Authentication and Drizzle (database server) · See more »

Drug packaging

Pharmaceutical packaging (or drug packaging) is the packages and the packaging processes for pharmaceutical preparations.

New!!: Authentication and Drug packaging · See more »

DRYAD

The DRYAD Numeral Cipher/Authentication System (KTC 1400 D) is a simple, paper cryptographic system employed by the U.S. military for authentication and for encryption of short, numerical messages.

New!!: Authentication and DRYAD · See more »

DS Logon

DS Logon (DoD Self-service Logon or DSL) is a secure, self-service logon ID created by the Defense Manpower Data Center as an enterprise identity credential that allows individuals affiliated with the Department of Defense (DoD) or the Department of Veterans Affairs (VA) access to several websites using a single username and password.

New!!: Authentication and DS Logon · See more »

Dynamic secrets

Dynamic Secrets is a novel key management scheme for secure communications.

New!!: Authentication and Dynamic secrets · See more »

E-commerce identification and identification types

A whole new range of techniques has been developed to identify people since the 1960s from the measurement and analysis of parts of their bodies to DNA profiles.

New!!: Authentication and E-commerce identification and identification types · See more »

EAuthentication

eAuthentication is an authentication service provided by one remote server to other distributed servers, on the Internet or an intranet.

New!!: Authentication and EAuthentication · See more »

EAX mode

EAX mode (encrypt-then-authenticate-then-translate) is a mode of operation for cryptographic block ciphers.

New!!: Authentication and EAX mode · See more »

Echo (communications protocol)

Echo (one-to-all, one-to-one, or one-to-some distribution) is a group communications protocol where authenticated and encrypted information is addressed to members connected to a node.

New!!: Authentication and Echo (communications protocol) · See more »

Eduroam

eduroam (education roaming) is an international roaming service for users in research, higher education and further education.

New!!: Authentication and Eduroam · See more »

EFx Factory

The EFx Factory (Architectural-Guidance Software Factory) is a pioneering Architectural Guidance Software Factory from Microsoft, and one of the first implementations of a software factory to be built.

New!!: Authentication and EFx Factory · See more »

EGovernment in Europe

All European countries show eGovernment initiatives, mainly related to the improvement of governance at the national level.

New!!: Authentication and EGovernment in Europe · See more »

EIDAS

eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation on / a set of standards for electronic identification and trust services for electronic transactions in the European Single Market.

New!!: Authentication and EIDAS · See more »

Electronic identification

An electronic identification ("eID") is a digital solution for proof of identity of citizens or organizations, for example in view to access benefits or services provided by government authorities, banks or other companies, for mobile payments, etc.

New!!: Authentication and Electronic identification · See more »

Electronic lock

An electronic lock (or electric lock) is a locking device which operates by means of electric current.

New!!: Authentication and Electronic lock · See more »

Electronic Signatures in Global and National Commerce Act

The Electronic Signatures in Global and National Commerce Act (ESIGN) is a United States federal law passed by the U.S. Congress to facilitate the use of electronic records and electronic signatures in interstate and foreign commerce by ensuring the validity and legal effect of contracts entered into electronically.

New!!: Authentication and Electronic Signatures in Global and National Commerce Act · See more »

Email authentication

Email authentication, or validation, is a collection of techniques aimed at equipping messages of the email transport system with verifiable information about their origin.

New!!: Authentication and Email authentication · See more »

Email encryption

Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients.

New!!: Authentication and Email encryption · See more »

Email hacking

Email hacking is the unauthorized access to, or manipulation of, an email account or email correspondence.

New!!: Authentication and Email hacking · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Authentication and Email spam · See more »

Emotional support animal

An emotional support animal (ESA), or simply "support animal", is a companion animal that a medical professional has determined provides benefit for an individual with a disability.

New!!: Authentication and Emotional support animal · See more »

Encrypting File System

The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption.

New!!: Authentication and Encrypting File System · See more »

Encrypting PIN Pad

An Encrypting PIN Pad is an apparatus for encrypting an identifier such as a PIN entered on a keypad.

New!!: Authentication and Encrypting PIN Pad · See more »

End node problem

The end node problem arises when individual computers are used for sensitive work and/or temporarily become part of a trusted, well-managed network/cloud and then are used for more risky activities and/or join untrusted networks.

New!!: Authentication and End node problem · See more »

Enemy

An enemy or a foe is an individual or a group that is verified as forcefully adverse or threatening.

New!!: Authentication and Enemy · See more »

Entersekt

Entersekt is a Stellenbosch, South Africa-based fintech provider of mobile-based authentication and app security software protecting online and mobile banking, e-commerce transactions, and access to sensitive records and systems in healthcare, insurance, and government.

New!!: Authentication and Entersekt · See more »

Epistles (Plato)

The Epistles (Greek: Ἐπιστολαί; Latin: Epistolae) of Plato are a series of thirteen letters traditionally included in the Platonic corpus.

New!!: Authentication and Epistles (Plato) · See more »

Eschatocol

An eschatocol, or closing protocol, is the final section of a legal or public document, which may include a formulaic sentence of appreciation; the attestation of those responsible for the document, which may be the author, writer, countersigner, principal parties involved, and witnesses to the enactment or the subscription; or both.

New!!: Authentication and Eschatocol · See more »

Event Viewer

Event Viewer is a component of Microsoft's Windows NT line of operating systems that lets administrators and users view the event logs on a local or remote machine.

New!!: Authentication and Event Viewer · See more »

Evidence (law)

The law of evidence, also known as the rules of evidence, encompasses the rules and legal principles that govern the proof of facts in a legal proceeding.

New!!: Authentication and Evidence (law) · See more »

Executable UML

Executable UML (xtUML or xUML) is both a software development method and a highly abstract software language.

New!!: Authentication and Executable UML · See more »

Exemplified copy

An exemplified copy (or exemplification) is an official attested copy or transcript of a public instrument, made under the seal and original pen-in-hand signature of a court or public functionary and in the name of the sovereign, e.g., "The People of the State of New York".

New!!: Authentication and Exemplified copy · See more »

Expertization

Expertization is the process of authentication of an object, usually of a sort that is collected, by an individual authority or a committee of authorities.

New!!: Authentication and Expertization · See more »

Extended matching items

Extended matching items/questions (EMI or EMQ) are a written examination format similar to multiple choice questions but with one key difference, that they test knowledge in a far more applied, in depth, sense.

New!!: Authentication and Extended matching items · See more »

Extended SMTP

Extended SMTP (ESMTP), sometimes referred to as Enhanced SMTP, is a definition of protocol extensions to the Simple Mail Transfer Protocol standard.

New!!: Authentication and Extended SMTP · See more »

EZproxy

EZproxy is a web proxy server used by libraries to give access from outside the library's computer network to restricted-access websites that authenticate users by IP address.

New!!: Authentication and EZproxy · See more »

F for Fake

F for Fake (Vérités et mensonges, "Truths and lies") is a 1975 docudrama film co-written, directed by, and starring Orson Welles who worked on the film alongside François Reichenbach, Oja Kodar, and Gary Graver.

New!!: Authentication and F for Fake · See more »

F5 Networks

F5 Networks, Inc. is an American-based company that specializes in application delivery networking (ADN) technology for the delivery of web applications and the security, performance, availability of servers, data storage devices, and other network and cloud resources.

New!!: Authentication and F5 Networks · See more »

Facial recognition system

A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.

New!!: Authentication and Facial recognition system · See more »

Factor

Factor, a Latin word meaning "who/which acts", may refer to.

New!!: Authentication and Factor · See more »

Factotum (software)

factotum is a password management and authentication protocol negotiation virtual file system for Plan 9 from Bell Labs.

New!!: Authentication and Factotum (software) · See more »

Fake passport

A fake passport is a counterfeit of a passport (or other travel document) issued by a nation or authorised agency.

New!!: Authentication and Fake passport · See more »

Fast and Secure Protocol

The Fast and Secure Protocol (FASP) is a proprietary data transfer protocol.

New!!: Authentication and Fast and Secure Protocol · See more »

FCAPS

FCAPS is the ISO Telecommunications Management Network model and framework for network management.

New!!: Authentication and FCAPS · See more »

Federated identity

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

New!!: Authentication and Federated identity · See more »

FeliCa

FeliCa is a contactless RFID smart card system from Sony in Japan, primarily used in electronic money cards.

New!!: Authentication and FeliCa · See more »

Field-programmable gate array

A field-programmable gate array (FPGA) is an integrated circuit designed to be configured by a customer or a designer after manufacturing hence "field-programmable".

New!!: Authentication and Field-programmable gate array · See more »

Fifth Letter (Plato)

The Fifth Letter of Plato, also called Epistle V or Letter V, is an epistle that tradition has ascribed to Plato.

New!!: Authentication and Fifth Letter (Plato) · See more »

Fingerprint

A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.

New!!: Authentication and Fingerprint · See more »

First Letter (Plato)

The First Letter of Plato, also called Epistle I or Letter I, is an epistle that tradition has ascribed to Plato, though it is almost universally considered a forgery.

New!!: Authentication and First Letter (Plato) · See more »

Food packaging

Food packaging is packaging for food.

New!!: Authentication and Food packaging · See more »

Forgery

Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive for the sake of altering the public perception, or to earn profit by selling the forged item.

New!!: Authentication and Forgery · See more »

ForgetMeNot Software

ForgetMeNot Software is a mobile communications technology company.

New!!: Authentication and ForgetMeNot Software · See more »

Form (HTML)

A webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing.

New!!: Authentication and Form (HTML) · See more »

Form-based authentication

Form-based authentication is a term of art in the context of Web- and Internet-based online networked computer systems.

New!!: Authentication and Form-based authentication · See more »

Formalities in English law

Formalities in English law are required in some kinds of transaction by English contract law and trusts law.

New!!: Authentication and Formalities in English law · See more »

Foswiki

Foswiki is an enterprise wiki, typically used to run a collaboration platform, knowledge base or document management system.

New!!: Authentication and Foswiki · See more »

FreeLAN

FreeLAN is computer software that implements peer-to-peer, full mesh, virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.

New!!: Authentication and FreeLAN · See more »

Friend-to-friend

A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know.

New!!: Authentication and Friend-to-friend · See more »

Front and back ends

In software engineering, the terms front end and back end refer to the separation of concerns between the presentation layer (front end), and the data access layer (back end) of a piece of software, or the physical infrastructure or hardware.

New!!: Authentication and Front and back ends · See more »

FuelPHP

FuelPHP is an open source web application framework written in PHP which implements the HMVC pattern.

New!!: Authentication and FuelPHP · See more »

Fuzzy extractor

Fuzzy extractors are a method that allows to use biometric data as inputs to standard cryptographic techniques for biometric security.

New!!: Authentication and Fuzzy extractor · See more »

G.hn

G.hn is a specification for home networking with data rates up to 2 Gbit/s and operation over four types of legacy wires: telephone wiring, coaxial cables, power lines and plastic optical fiber.

New!!: Authentication and G.hn · See more »

Gamification

Gamification is the application of game-design elements and game principles in non-game contexts.

New!!: Authentication and Gamification · See more »

GateKeeper (access control device)

GateKeeper is a wireless proximity-based access control and authentication device that allows a user to automatically lock their computer by walking away and unlock it by walking back.

New!!: Authentication and GateKeeper (access control device) · See more »

General Inter-ORB Protocol

In distributed computing, General Inter-ORB Protocol (GIOP GIABEL) is the message protocol by which object request brokers (ORBs) communicate in CORBA.

New!!: Authentication and General Inter-ORB Protocol · See more »

Generic Security Services Application Program Interface

The Generic Security Service Application Program Interface (GSSAPI, also GSS-API) is an application programming interface for programs to access security services.

New!!: Authentication and Generic Security Services Application Program Interface · See more »

Gerald Clarke (artist)

Gerald Clarke (February 24, 1967-) is a sculptor, installation, and conceptual artist from the Cahuilla Band of Mission Indians.

New!!: Authentication and Gerald Clarke (artist) · See more »

Giesecke & Devrient

Giesecke+Devrient (G+D) is a German company headquartered in Munich that provides banknote and securities printing, smart cards, and cash handling systems.

New!!: Authentication and Giesecke & Devrient · See more »

Google APIs

Google APIs is a set of application programming interfaces (APIs) developed by Google which allow communication with Google Services and their integration to other services.

New!!: Authentication and Google APIs · See more »

Google Play Services

Google Play Services is a proprietary background service and API package for Android devices from Google.

New!!: Authentication and Google Play Services · See more »

GoToMeeting

GoToMeeting is a web-hosted service created and marketed by LogMeIn.

New!!: Authentication and GoToMeeting · See more »

GoToTraining

GoToTraining is a web-hosted online training service.

New!!: Authentication and GoToTraining · See more »

Graue Mill

The Graue Mill is a water-powered grist mill that was originally erected in 1852.

New!!: Authentication and Graue Mill · See more »

Gustavus Simmons

Gustavus J. Simmons (born 1930) is a retired cryptographer and former manager of the applied mathematics Department and Senior Fellow at Sandia National Laboratories.

New!!: Authentication and Gustavus Simmons · See more »

H.235

H.235 covers security and encryption for H.323 and other H.245 based terminals The standard addresses authentication by means of several algorithms, including Diffie-Hellman methods, and privacy.

New!!: Authentication and H.235 · See more »

Hardware-based full disk encryption

Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD) vendors, including: iStorage Limited, Seagate Technology, Hitachi, Western Digital, Samsung, Toshiba and also solid-state drive vendors such as OCZ, SanDisk, Samsung, Micron and Integral Memory.

New!!: Authentication and Hardware-based full disk encryption · See more »

Hash chain

A hash chain is the successive application of a cryptographic hash function to a piece of data.

New!!: Authentication and Hash chain · See more »

HealthCare.gov

HealthCare.gov is a health insurance exchange website operated under the United States federal government under the provisions of the Patient Protection and Affordable Care Act (PPACA, often referred to simply as 'ACA' or 'Obamacare'), which currently serves the residents of the U.S. states which have opted not to create their own state exchanges.

New!!: Authentication and HealthCare.gov · See more »

Hiawatha (web server)

Hiawatha is a web server available for multiple platforms.

New!!: Authentication and Hiawatha (web server) · See more »

HiperLAN

HiperLAN (High Performance Radio LAN) is a Wireless LAN standard.

New!!: Authentication and HiperLAN · See more »

Historic Spanish Point

Historic Spanish Point is a museum and environmental complex located in Osprey, Florida.

New!!: Authentication and Historic Spanish Point · See more »

Historical fiction

Historical fiction is a literary genre in which the plot takes place in a setting located in the past.

New!!: Authentication and Historical fiction · See more »

Historical romance

Historical romance (also historical novel) is a broad category of fiction in which the plot takes place in a setting located in the past.

New!!: Authentication and Historical romance · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Authentication and HMAC · See more »

Hotspot (Wi-Fi)

A hotspot is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.

New!!: Authentication and Hotspot (Wi-Fi) · See more »

Hotspot gateway

A hotspot gateway is a device that provides authentication, authorization and accounting for a wireless network.

New!!: Authentication and Hotspot gateway · See more »

HTTP+HTML form-based authentication

HTTP+HTML form-based authentication, typically presently colloquially referred to as simply form-based authentication, is a technique whereby a website uses a web form to collect, and subsequently authenticate, credential information from a user agent, typically a web browser.

New!!: Authentication and HTTP+HTML form-based authentication · See more »

HTTPS

HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.

New!!: Authentication and HTTPS · See more »

HTTPsec

HTTPsec ("HTTP security") is an authentication scheme for the web protocol HTTP.

New!!: Authentication and HTTPsec · See more »

Human rights and encryption

Human rights applied to encryption is an important concept for freedom of expression as encryption is a technical resource of implementation of basic human rights.

New!!: Authentication and Human rights and encryption · See more »

Hypothesis

A hypothesis (plural hypotheses) is a proposed explanation for a phenomenon.

New!!: Authentication and Hypothesis · See more »

IAPM (mode)

Integrity Aware Parallelizable Mode (IAPM) is a mode of operation for cryptographic block ciphers.

New!!: Authentication and IAPM (mode) · See more »

Ibanez JEM

Ibanez JEM is an electric guitar manufactured by Ibanez and first produced in 1987.

New!!: Authentication and Ibanez JEM · See more »

IBM Blueworks Live

IBM Blueworks Live is a business process modeller, belonging under the set of IBM SmartCloud applications.

New!!: Authentication and IBM Blueworks Live · See more »

IBM Lightweight Third-Party Authentication

Lightweight Third-Party Authentication (LTPA), is an authentication technology used in IBM WebSphere and Lotus Domino products.

New!!: Authentication and IBM Lightweight Third-Party Authentication · See more »

IBM Tivoli Access Manager

IBM Tivoli Access Manager (TAM) is an authentication and authorization solution for corporate web services, operating systems, and existing applications.

New!!: Authentication and IBM Tivoli Access Manager · See more »

IBM Tivoli Directory Server

IBM Security Directory Server, formerly known as IBM Directory Server and IBM Tivoli Directory Server, is an IBM implementation of the Lightweight Directory Access Protocol IBM Security Directory Server is an enterprise directory for corporate intranets and the Internet.

New!!: Authentication and IBM Tivoli Directory Server · See more »

IBM WebSphere Application Server Community Edition

WebSphere Application Server Community Edition (from now on WASCE) is a free-of-charge, certified Java EE 6 application server for building and managing Java applications.

New!!: Authentication and IBM WebSphere Application Server Community Edition · See more »

IBM WebSphere Service Registry and Repository Feature Pack for Service Federation Management

IBM WebSphere Service Registry and Repository Feature Pack for Service Federation Management is IBM's implementation of the Service Federation Management concept.

New!!: Authentication and IBM WebSphere Service Registry and Repository Feature Pack for Service Federation Management · See more »

ID-based encryption

ID-based encryption, or identity-based encryption (IBE), is an important primitive of ID-based cryptography.

New!!: Authentication and ID-based encryption · See more »

Identification (information)

The function of identification is to map a known quantity to an unknown entity so as to make it known.

New!!: Authentication and Identification (information) · See more »

Identity 2.0

Identity 2.0, also called digital identity, is a set of methods for identity verification on the internet using emerging user-centric technologies such as Information Cards or OpenID.

New!!: Authentication and Identity 2.0 · See more »

Identity driven networking

Identity driven networking (IDN) is the process of applying network controls to a network device access based on the identity of an individual or group of individuals responsible to or operating the device.

New!!: Authentication and Identity driven networking · See more »

Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

New!!: Authentication and Identity management · See more »

Identity score

An identity score is a system for detecting identity theft.

New!!: Authentication and Identity score · See more »

Identity-based security

Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.

New!!: Authentication and Identity-based security · See more »

Idex ASA

Idex ASA (Oslo Stock Exchange/Oslo Børs) is a Norwegian biometrics company, specialising in fingerprint imaging and fingerprint recognition technology.

New!!: Authentication and Idex ASA · See more »

IEC 60870-6

A typical national power grid includes a hierarchy of control centres to manage the generation, transmission, and distribution of power throughout the grid.

New!!: Authentication and IEC 60870-6 · See more »

IEEE 802.1X

IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC).

New!!: Authentication and IEEE 802.1X · See more »

IEEE 802.21

The IEEE 802.21 refers to Media Independent Handoff (MIH) and is an IEEE standard published in 2008.

New!!: Authentication and IEEE 802.21 · See more »

IEEE 802.22

IEEE 802.22, is a standard for wireless regional area network (WRAN) using white spaces in the television (TV) frequency spectrum.

New!!: Authentication and IEEE 802.22 · See more »

Index of cryptography articles

Articles related to cryptography include.

New!!: Authentication and Index of cryptography articles · See more »

Index of Internet-related articles

This page provides an index of articles thought to be Internet or Web related topics.

New!!: Authentication and Index of Internet-related articles · See more »

Information privacy

Information privacy, or data privacy (or data protection), is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

New!!: Authentication and Information privacy · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Authentication and Information security · See more »

Information technology specialist (military)

Information Technology Specialist or lnformation Systems Operator-Analyst is a Military Occupational Specialty (MOS) in the United States Army.

New!!: Authentication and Information technology specialist (military) · See more »

Initialization vector

In cryptography, an initialization vector (IV) or starting variable (SV) is a fixed-size input to a cryptographic primitive that is typically required to be random or pseudorandom.

New!!: Authentication and Initialization vector · See more »

Intel Active Management Technology

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them.

New!!: Authentication and Intel Active Management Technology · See more »

Intelligence source and information reliability

Intelligence source and information reliability rating systems are used in intelligence analysis.

New!!: Authentication and Intelligence source and information reliability · See more »

Internet

The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Authentication and Internet · See more »

Internet Information Services

Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family.

New!!: Authentication and Internet Information Services · See more »

Internet Printing Protocol

The Internet Printing Protocol (IPP) is an Internet protocol for communication between computers and printers (or print server).

New!!: Authentication and Internet Printing Protocol · See more »

Internet security

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level, as it applies to other applications or operating systems as a whole.

New!!: Authentication and Internet security · See more »

Intrusion detection system

An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.

New!!: Authentication and Intrusion detection system · See more »

IP address spoofing

In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.

New!!: Authentication and IP address spoofing · See more »

IP Multimedia Subsystem

The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering IP multimedia services.

New!!: Authentication and IP Multimedia Subsystem · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: Authentication and IPsec · See more »

ISMACryp

The ISMA Encryption and Authentication, Version 1.1 specification (or ISMACryp) specifies encryption and message authentication services for MPEG-4 over RTP streams.

New!!: Authentication and ISMACryp · See more »

ISO/IEC 19794-5

ISO/IEC 19794 Information technology — Biometric data interchange formats — Part 5: Face image data, or ISO/IEC 19794-5 for short, is the fifth of 8 parts of the ISO standard ISO/IEC 19794, published in 2005, which describes interchange formats for several types of biometric data.

New!!: Authentication and ISO/IEC 19794-5 · See more »

ISO/IEC 24727

ISO/IEC 24727 (Identification cards – Integrated circuit card programming interfaces) is the first international standard to address the need for creation of a layered framework to support interoperability of smart cards providing identification, authentication, and (digital) signature services.

New!!: Authentication and ISO/IEC 24727 · See more »

ISO/IEC 27040

ISO/IEC 27040 is part of a growing family of International Standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in the area of security techniques; the standard is being developed by Subcommitee 27 (SC27) - IT Security techniques of the first Joint Technical Committee 1 (JTC 1) of the ISO/IEC.

New!!: Authentication and ISO/IEC 27040 · See more »

Jack Dorsey

Jack Patrick Dorsey (born November 19, 1976) is an American computer programmer and Internet entrepreneur who is co-founder and CEO of Twitter, and founder and CEO of Square, a mobile payments company.

New!!: Authentication and Jack Dorsey · See more »

Jack Ogden (jewellery historian)

Jack Ogden, FSA, FGA, is a distinguished jewellery historian with a particular interest in the development of materials and technology.

New!!: Authentication and Jack Ogden (jewellery historian) · See more »

Java Authentication and Authorization Service

Java Authentication and Authorization Service, or JAAS, pronounced "Jazz", is the Java implementation of the standard Pluggable Authentication Module (PAM) information security framework.

New!!: Authentication and Java Authentication and Authorization Service · See more »

Java Secure Socket Extension

In computing, the Java Secure Socket Extension (JSSE) provides a set of packages that enable secure Internet communications.

New!!: Authentication and Java Secure Socket Extension · See more »

Jay's Journal

Jay's Journal is a book presented as an autobiographical account of a depressed teenage boy who becomes involved with a Satanic group.

New!!: Authentication and Jay's Journal · See more »

Jeong Yim

Jeong Ah Yim (張炎; c. 1814–c. 1893) a.k.a. Jeung Yim, Cheung Yim, Cheung Hung Sing, Jeong Hung Sing, Jeong Hong Sing, Zhang Yan, Zhang Hongsheng; is recognized as an important contributor to the expansion of Choy Li Fut - a Chinese martial arts system, but his role in the development is unclear as exemplified in the variety of stories reported about his life, his involvement with the development of Choy Li Fut, and his anti-Qing revolutionary activities.

New!!: Authentication and Jeong Yim · See more »

Jerry Sandusky

Gerald Arthur Sandusky (born January 26, 1944) is an American convicted serial rapist, child molester and retired college football coach.

New!!: Authentication and Jerry Sandusky · See more »

Joe job

A joe job is a spamming technique that sends out unsolicited e-mails using spoofed sender data.

New!!: Authentication and Joe job · See more »

Joel H. Johnson

Joel Hills Johnson (March 23, 1802 – September 24, 1882) was a Latter Day Saint missionary and hymn writer, most famous as the author of "High on the Mountain Top" (hymn #5 in the 1985 LDS hymnbook, English edition).

New!!: Authentication and Joel H. Johnson · See more »

John Evans (supercentenarian)

John Evans (19 August 1877 – 10 June 1990) of Fforestfach, Swansea, was the longest-lived man from the United Kingdom whose date of birth could be authenticated; he held this record from 27 May 1989 until 29 March 2009, when Henry Allingham broke it.

New!!: Authentication and John Evans (supercentenarian) · See more »

Kenneth Arrow

Kenneth Joseph "Ken" Arrow (23 August 1921 – 21 February 2017) was an American economist, mathematician, writer, and political theorist.

New!!: Authentication and Kenneth Arrow · See more »

Kenneth P. Weiss

Kenneth P. Weiss is an American entrepreneur, human factors engineer and inventor.

New!!: Authentication and Kenneth P. Weiss · See more »

Kennitala

The kennitala (plural: kennitölur; abbreviated kt.) is a unique national identification number used by the Icelandic government to identify individuals and organisations in Iceland, administered by the Registers Iceland.

New!!: Authentication and Kennitala · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: Authentication and Kerberos (protocol) · See more »

Key selection vector

The Key Selection Vector means the numeric value associated with a Device Key Set and distributed by Licensor or its designee to Adopters and used to support authentication of Licensed Products and Revocation.

New!!: Authentication and Key selection vector · See more »

Kondō Isami

was a Japanese swordsman and official of the late Edo period, famed for his role as commander of the Shinsengumi.

New!!: Authentication and Kondō Isami · See more »

L-1 Identity Solutions

L-1 Identity Solutions, Inc. is a large American defense contractor in Connecticut.

New!!: Authentication and L-1 Identity Solutions · See more »

Label

A label (as distinct from signage) is a piece of paper, plastic film, cloth, metal, or other material affixed to a container or product, on which is written or printed information or symbols about the product or item.

New!!: Authentication and Label · See more »

Land diving

Land diving (known in the local Sa language as Gol and in Bislama as Nanggol) is a ritual performed by the men of the southern part of Pentecost Island, Vanuatu.

New!!: Authentication and Land diving · See more »

Laravel

Laravel is a free, open-source PHP web framework, created by Taylor Otwell and intended for the development of web applications following the model–view–controller (MVC) architectural pattern and based on Symfony.

New!!: Authentication and Laravel · See more »

Legal instrument

Legal instrument is a legal term of art that is used for any formally executed written document that can be formally attributed to its author, records and formally expresses a legally enforceable act, process, or contractual duty, obligation, or right, and therefore evidences that act, process, or agreement.

New!!: Authentication and Legal instrument · See more »

Levels of identity security

The security features governing the security of an identity can be divided into three levels of security, i.e. Level 1 Security (L1S) (Overt), Level 2 Security (L2S) (Covert) and Level 3 Security (L3S) (Forensic).

New!!: Authentication and Levels of identity security · See more »

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

New!!: Authentication and Lightweight Directory Access Protocol · See more »

Lightweight Extensible Authentication Protocol

The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary wireless LAN authentication method developed by Cisco Systems.

New!!: Authentication and Lightweight Extensible Authentication Protocol · See more »

Linked timestamping

Linked timestamping is a type of trusted timestamping where issued time-stamps are related to each other.

New!!: Authentication and Linked timestamping · See more »

List of CDMA terminology

This page contains terminology related to CDMA.

New!!: Authentication and List of CDMA terminology · See more »

List of computer term etymologies

This is a list of the origins of computer-related terms or terms used in the computing world (i.e., a list of computer term etymologies).

New!!: Authentication and List of computer term etymologies · See more »

List of cryptographers

List of cryptographers.

New!!: Authentication and List of cryptographers · See more »

List of HTTP status codes

This is a list of Hypertext Transfer Protocol (HTTP) response status codes.

New!!: Authentication and List of HTTP status codes · See more »

List of important publications in cryptography

This is a list of important publications in cryptography, organized by field.

New!!: Authentication and List of important publications in cryptography · See more »

Local eGovernment

Local eGovernment is eGovernment as it relates to local government, police, fire, national park and transport authorities.

New!!: Authentication and Local eGovernment · See more »

Location-based authentication

Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a distinct location.

New!!: Authentication and Location-based authentication · See more »

LocationSmart

LocationSmart, originally called TechnoCom Location Platform, is a location-as-a-service (LaaS) company based in Carlsbad, California, that provides location APIs to enterprises and operates a secure, cloud-based and privacy-protected platform.

New!!: Authentication and LocationSmart · See more »

Log analysis

In computer log management and intelligence, log analysis (or system and network log analysis) is an art and science seeking to make sense out of computer-generated records (also called log or audit trail records).

New!!: Authentication and Log analysis · See more »

Logical access control

In computers, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability in computer information systems.

New!!: Authentication and Logical access control · See more »

Logical security

Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.

New!!: Authentication and Logical security · See more »

LogicalDOC

LogicalDOC is a proprietary document management system that is designed to handle and share documents within an organization.

New!!: Authentication and LogicalDOC · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Authentication and Login · See more »

Login manager

A login manager is a login system for Unix and Unix-like operating systems.

New!!: Authentication and Login manager · See more »

Lucien Wolf

Lucien Wolf (1857 in London1930) was an English Jewish journalist, historian, and advocate of Jewish rights.

New!!: Authentication and Lucien Wolf · See more »

Luxury packaging

Luxury and specialty packaging is the design, research, development, and manufacturing of packaging, displays, and for luxury brands.

New!!: Authentication and Luxury packaging · See more »

Magic cookie

In computing, a magic cookie, or just cookie for short, is a token or short packet of data passed between communicating programs, where the data is typically not meaningful to the recipient program.

New!!: Authentication and Magic cookie · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Authentication and Malware · See more »

Managed services

Managed services is the practice of outsourcing on a proactive basis management responsibilities and functions and a strategic method intended to improve operations and cut expenses.

New!!: Authentication and Managed services · See more »

Manu propria

(Latin for ' with one's own hand'), abbreviated to m.p. or mppria is a phrase sometimes used at the end of typewritten or printed documents when there is no handwritten signature.

New!!: Authentication and Manu propria · See more »

Maui Fever

Maui Fever is an American reality television series on MTV.

New!!: Authentication and Maui Fever · See more »

Medium of exchange

A medium of exchange is a tradeable entity used to avoid the inconveniences of a pure barter system.

New!!: Authentication and Medium of exchange · See more »

Message authentication

In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.

New!!: Authentication and Message authentication · See more »

Message forgery

In cryptography, message forgery is the sending of a message to deceive the recipient as to whom the real sender is.

New!!: Authentication and Message forgery · See more »

Microsoft CryptoAPI

The Microsoft windows platform specific Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API, MS-CAPI or simply CAPI) is an application programming interface included with Microsoft Windows operating systems that provides services to enable developers to secure Windows-based applications using cryptography.

New!!: Authentication and Microsoft CryptoAPI · See more »

Microsoft Live Labs

Microsoft Live Labs was a partnership between MSN and Microsoft Research that focused on applied research for Internet products and services at Microsoft.

New!!: Authentication and Microsoft Live Labs · See more »

MIFARE

MIFARE is the NXP Semiconductors-owned trademark of a series of chips widely used in contactless smart cards and proximity cards.

New!!: Authentication and MIFARE · See more »

Minos (dialogue)

Minos (or; Μίνως) is purported to be one of the dialogues of Plato.

New!!: Authentication and Minos (dialogue) · See more »

MMH-Badger MAC

Badger is a Message Authentication Code (MAC) based on the idea of universal hashing and was developed by Boesgaard, Scavenius, Pedersen, Christensen, and Zenner.

New!!: Authentication and MMH-Badger MAC · See more »

Mobile app

A mobile app is a computer program designed to run on a mobile device such as a phone/tablet or watch.

New!!: Authentication and Mobile app · See more »

Mobile banking

Mobile banking is a service provided by a bank or other financial institution that allows its customers to conduct financial transactions remotely using a mobile device such as a smartphone or tablet.

New!!: Authentication and Mobile banking · See more »

Mobile business intelligence

Mobile Business Intelligence (Mobile BI or Mobile Intelligence) is defined as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets (not laptops), to enable effective decision-making and management support, for the overall purpose of increasing firm performance.” (Peters et al., 2016).

New!!: Authentication and Mobile business intelligence · See more »

Mobile identity management

Mobile identity is a development of online authentication and digital signatures, where the SIM card of one’s mobile phone works as an identity tool.

New!!: Authentication and Mobile identity management · See more »

Mobile virtual private network

A mobile virtual private network (mobile VPN or mVPN) is a VPN which is capable of persisting during sessions across changes in physical connectivity, point of network attachment, and IP address.

New!!: Authentication and Mobile virtual private network · See more »

Mobility management

Mobility management is one of the major functions of a GSM or a UMTS network that allows mobile phones to work.

New!!: Authentication and Mobility management · See more »

Moose File System

Moose File System (MooseFS) is an Open-source, POSIX-compliant distributed file system developed by Core Technology.

New!!: Authentication and Moose File System · See more »

Moti Yung

Mordechai M. (Moti) Yung is an Israeli-American cryptographer and computer scientist with an extensive industrial research career.

New!!: Authentication and Moti Yung · See more »

Mouse tracking

Mouse tracking (also known as cursor tracking) is the use of software to collect users' mouse cursor positions on the computer.

New!!: Authentication and Mouse tracking · See more »

Mozilla

Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape.

New!!: Authentication and Mozilla · See more »

Mozilla Persona

Mozilla Persona was a decentralized authentication system for the web, based on the open BrowserID protocol prototyped by Mozilla and standardized by IETF.

New!!: Authentication and Mozilla Persona · See more »

MQV

MQV (Menezes–Qu–Vanstone) is an authenticated protocol for key agreement based on the Diffie–Hellman scheme.

New!!: Authentication and MQV · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Authentication and Multi-factor authentication · See more »

Munax

Munax was a Swedish company that developed a Large Hyper-Parallel Execution (LHPE) search engine system Munax XE.

New!!: Authentication and Munax · See more »

Mutual authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

New!!: Authentication and Mutual authentication · See more »

Mykola Melnychenko

(Major) Mykola Melnychenko (Микола Іванович Мельниченко, born 18 October 1966 in Vasylkiv, Ukrainian SSR) was a bodyguard of Leonid Kuchma (President of Ukraine), an officer of the State Security Administration.

New!!: Authentication and Mykola Melnychenko · See more »

NaCl (software)

NaCl (pronounced "salt") is an abbreviation for "Networking and Cryptography library", a public domain "...high-speed software library for network communication, encryption, decryption, signatures, etc".

New!!: Authentication and NaCl (software) · See more »

Naor–Reingold pseudorandom function

In 1997, Moni Naor and Omer Reingold described efficient constructions for various cryptographic primitives in private key as well as public-key cryptography.

New!!: Authentication and Naor–Reingold pseudorandom function · See more »

NAT Port Mapping Protocol

The NAT Port Mapping Protocol (NAT-PMP) is a network protocol for establishing network address translation (NAT) settings and port forwarding configurations automatically without user effort.

New!!: Authentication and NAT Port Mapping Protocol · See more »

National Digital Preservation Program

Keeping the foresight of rapidly changing technologies and rampant digital obsolescence, in 2008, the R & D in IT Group, Ministry of Electronics and Information Technology, Government of India envisaged to evolve Indian digital preservation initiative.

New!!: Authentication and National Digital Preservation Program · See more »

National Police Computing and Material Service (Norway)

National Police Computing and Material Service (Politiets data- og materielltjeneste, PMDT) is an agency of the Norwegian Police Service which has the responsibility for information and communications technology, procurement, security and real estate.

New!!: Authentication and National Police Computing and Material Service (Norway) · See more »

Nationwide Suspicious Activity Reporting Initiative

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States.

New!!: Authentication and Nationwide Suspicious Activity Reporting Initiative · See more »

Needham–Schroeder protocol

The Needham–Schroeder protocol is one of the two key transport protocols intended for use over an insecure network, both proposed by Roger Needham and Michael Schroeder.

New!!: Authentication and Needham–Schroeder protocol · See more »

Network Access Control

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

New!!: Authentication and Network Access Control · See more »

Network Computer Reference Profile

Network Computer Reference Profile (NC reference profle, NCRP) was a specification for a network computer put forward by Oracle Corporation, endorsed by Sun Microsystems, IBM, Apple Computer, and Netscape, and finalized in 1996.

New!!: Authentication and Network Computer Reference Profile · See more »

Network Information Service

The Network Information Service, or NIS (originally called Yellow Pages or YP), is a client–server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network.

New!!: Authentication and Network Information Service · See more »

Network security

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

New!!: Authentication and Network security · See more »

Network switching subsystem

Network switching subsystem (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations.

New!!: Authentication and Network switching subsystem · See more »

Neuman–Stubblebine protocol

The Neuman–Stubblebine protocol is a computer network authentication protocol designed for use on insecure networks (e.g., the Internet).

New!!: Authentication and Neuman–Stubblebine protocol · See more »

New World Order (conspiracy theory)

The New World Order or NWO is claimed to be an emerging clandestine totalitarian world government by various conspiracy theories.

New!!: Authentication and New World Order (conspiracy theory) · See more »

Next-Generation Secure Computing Base

The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a cancelled software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity.

New!!: Authentication and Next-Generation Secure Computing Base · See more »

Nicholas Forrest

Nicholas Forrest (born 1983) is a Sydney/London based antique and art market analyst, consultant and writer.

New!!: Authentication and Nicholas Forrest · See more »

Nok Nok Labs

Nok Nok Labs is a venture-backed company located in Palo Alto, California that develops software to enable strong authentication for consumer-facing mobile and web applications.

New!!: Authentication and Nok Nok Labs · See more »

Non-commutative cryptography

Non-commutative cryptography is the area of cryptology where the cryptographic primitives, methods and systems are based on algebraic structures like semigroups, groups and rings which are non-commutative.

New!!: Authentication and Non-commutative cryptography · See more »

Norwegian Police Service

The Norwegian Police Service (Politi- og lensmannsetaten) is the Norwegian civilian police agency.

New!!: Authentication and Norwegian Police Service · See more »

Norwegian Public Safety Network

The Norwegian Public Safety Network (Nødnett literally Emergency Network) is a public safety network system based on Terrestrial Trunked Radio (TETRA).

New!!: Authentication and Norwegian Public Safety Network · See more »

NSA encryption systems

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952.

New!!: Authentication and NSA encryption systems · See more »

NuFW

NuFW is a software package that extends Netfilter, the Linux kernel-internal packet filtering firewall module.

New!!: Authentication and NuFW · See more »

Null encryption

In modern cryptography, null encryption (or selecting null cipher or NONE cipher) is choosing not to use encryption in a system where various encryption options are offered.

New!!: Authentication and Null encryption · See more »

OASIS (organization)

The Organization for the Advancement of Structured Information Standards (OASIS) is a global nonprofit consortium that works on the development, convergence, and adoption of standards for security, Internet of Things, energy, content technologies, emergency management, and other areas.

New!!: Authentication and OASIS (organization) · See more »

Off-the-Record Messaging

Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations.

New!!: Authentication and Off-the-Record Messaging · See more »

On-board diagnostics

On-board diagnostics (OBD) is an automotive term referring to a vehicle's self-diagnostic and reporting capability.

New!!: Authentication and On-board diagnostics · See more »

One-time pad

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.

New!!: Authentication and One-time pad · See more »

One-way function

In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input.

New!!: Authentication and One-way function · See more »

Online banking

Online banking, also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.

New!!: Authentication and Online banking · See more »

Online identity

Internet identity (IID), also online identity or internet persona, is a social identity that an Internet user establishes in online communities and websites.

New!!: Authentication and Online identity · See more »

Open mail relay

An open mail relay is an SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users.

New!!: Authentication and Open mail relay · See more »

Open Web Interface for .NET

OWIN (Open Web Interface for.NET) is a standard for an interface between.NET Web applications and Web servers.

New!!: Authentication and Open Web Interface for .NET · See more »

OpenAM

OpenAM is an open source access management, entitlements and federation server platform.

New!!: Authentication and OpenAM · See more »

OpenID

OpenID is an open standard and decentralized authentication protocol.

New!!: Authentication and OpenID · See more »

OpenID Connect

OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, an authorization framework.

New!!: Authentication and OpenID Connect · See more »

OpenPGP card

In cryptography, the OpenPGP cardOpenPGP Card specification - version 3.0.1, Achim Pietig, PPC Card Systems GmbH, 2015.

New!!: Authentication and OpenPGP card · See more »

OpenSC

OpenSC is a set of software tools and libraries to work with smart cards, with the focus on smart cards with cryptographic capabilities.

New!!: Authentication and OpenSC · See more »

OpenSSH

OpenSSH (also known as OpenBSD Secure Shell) is a suite of security-related network-level utilities based on the Secure Shell (SSH) protocol, which help to secure network communications via the encryption of network traffic over multiple authentication methods and by providing secure tunneling capabilities.

New!!: Authentication and OpenSSH · See more »

OpenVPN

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.

New!!: Authentication and OpenVPN · See more »

Oracle Adaptive Access Manager

The Oracle Adaptive Access Manager is part of the Oracle Identity Management product suite that provides access control services to web and other online applications.

New!!: Authentication and Oracle Adaptive Access Manager · See more »

Orkut

Orkut was a social networking website owned and operated by Google.

New!!: Authentication and Orkut · See more »

OTPW

OTPW is a one-time password system developed for authentication in Unix-like operating systems by Markus Kuhn.

New!!: Authentication and OTPW · See more »

Otway–Rees protocol

The Otway–Rees protocol is a computer network authentication protocol designed for use on insecure networks (e.g. the Internet).

New!!: Authentication and Otway–Rees protocol · See more »

OurTunes

ourTunes is a cross-platform Java-based file sharing client which allows users to connect to iTunes and share MP3 and AAC music files over a local area subnetwork.

New!!: Authentication and OurTunes · See more »

Out of wallet

Out of Wallet refers to private data used for authentication in activities such as telephone banking or internet banking to prevent identity theft.

New!!: Authentication and Out of wallet · See more »

Outline of computer security

The following outline is provided as an overview of and topical guide to computer security: Computer security – security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet.

New!!: Authentication and Outline of computer security · See more »

Outline of cryptography

The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information.

New!!: Authentication and Outline of cryptography · See more »

Overwrap

An overwrap or wrap is applied over an item or is applied over another form of packaging.

New!!: Authentication and Overwrap · See more »

Package pilferage

Pilferage is the theft of part of the contents of a package.

New!!: Authentication and Package pilferage · See more »

Packaging and labeling

Packaging is the science, art and technology of enclosing or protecting products for distribution, storage, sale, and use.

New!!: Authentication and Packaging and labeling · See more »

Parental controls

Parental controls are features which may be included in digital television services, computer and video games, mobile devices and software that allow parents to restrict the access of content to their children.

New!!: Authentication and Parental controls · See more »

PassMap

PassMap is a map-based graphical password method of authentication, similar to passwords, proposed by National Tsing Hua University researchers.

New!!: Authentication and PassMap · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Authentication and Password · See more »

PEAR

The PHP Extension and Application Repository, or PEAR, is a repository of PHP software code.

New!!: Authentication and PEAR · See more »

Peter Landrock

Peter Landrock (born August 20, 1948 in Horsens) is a Danish cryptographer and mathematician.

New!!: Authentication and Peter Landrock · See more »

Pharming

Pharming is a cyber attack intended to redirect a website's traffic to another, fake site.

New!!: Authentication and Pharming · See more »

Photo identification

Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only his or her face.

New!!: Authentication and Photo identification · See more »

PhpBB

phpBB is an Internet forum package in the PHP scripting language.

New!!: Authentication and PhpBB · See more »

Pindrop Security

Pindrop Security is an American information security company that provides risk scoring for phone calls to detect fraud and authenticate callers.

New!!: Authentication and Pindrop Security · See more »

Plesk

Plesk is a commercial web hosting platform with a control panel that allows a server administrator to set up new websites, reseller accounts, e-mail accounts, and DNS entries through a web-based interface.

New!!: Authentication and Plesk · See more »

Pluggable authentication module

A pluggable authentication module (PAM) is a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API).

New!!: Authentication and Pluggable authentication module · See more »

Point-to-Point Protocol

In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.

New!!: Authentication and Point-to-Point Protocol · See more »

Point-to-Point Protocol over ATM

In computer networking, the Point-to-Point Protocol over ATM (PPPoA) is a layer 2 data-link protocol typically used to connect domestic broadband modems to ISPs via phone lines.

New!!: Authentication and Point-to-Point Protocol over ATM · See more »

Point-to-Point Protocol over Ethernet

The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames.

New!!: Authentication and Point-to-Point Protocol over Ethernet · See more »

Point-to-Point Tunneling Protocol

The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.

New!!: Authentication and Point-to-Point Tunneling Protocol · See more »

Policy appliances

Policy appliances are technical control and logging mechanisms to enforce or reconcile policy rules (information use rules) and to ensure accountability in information systems.

New!!: Authentication and Policy appliances · See more »

POP before SMTP

POP before SMTP or SMTP after POP is a method of authentication used by mail server software which helps allow users the option to send e-mail from any location, as long as they can demonstrably also fetch their mail from the same place.

New!!: Authentication and POP before SMTP · See more »

Port Control Protocol

Port Control Protocol (PCP) is a computer networking protocol that allows hosts on IPv4 or IPv6 networks to control how the incoming IPv4 or IPv6 packets are translated and forwarded by an upstream router that performs network address translation (NAT) or packet filtering.

New!!: Authentication and Port Control Protocol · See more »

Portrait of a Young Man with a Golden Chain

Portrait of a Young Man with a Gold Chain is an oil painting usually attributed to the Dutch painter Rembrandt.

New!!: Authentication and Portrait of a Young Man with a Golden Chain · See more »

Post Office Protocol

In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a server in an Internet Protocol (IP) network.

New!!: Authentication and Post Office Protocol · See more »

Postage stamps and postal history of Cuba

This is a survey of the postage stamps and postal history of Cuba.

New!!: Authentication and Postage stamps and postal history of Cuba · See more »

PRADO (framework)

PRADO is an open source, object-oriented, event-driven, component-based PHP web framework.

New!!: Authentication and PRADO (framework) · See more »

Pretty Good Privacy

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.

New!!: Authentication and Pretty Good Privacy · See more »

Provenance

Provenance (from the French provenir, 'to come from/forth') is the chronology of the ownership, custody or location of a historical object.

New!!: Authentication and Provenance · See more »

Proxy server

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.

New!!: Authentication and Proxy server · See more »

Public eProcurement

The term Public eProcurement ("electronic procurement" in the public sector) refers, in Singapore, Ukraine, Europe and Canada, to the use of electronic means in conducting a public procurement procedure for the purchase of goods, works or services.

New!!: Authentication and Public eProcurement · See more »

Public key infrastructure

A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

New!!: Authentication and Public key infrastructure · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Authentication and Public-key cryptography · See more »

Pull printing

Pull printing is a printing feature where a user's print job is held on a server (server-based pull printing) or on a user's workstation (serverless pull printing) and released by the user at any printing device (pulled to the printer) which supports this feature.

New!!: Authentication and Pull printing · See more »

Qualified digital certificate

Under the context of Regulation (EU) No 910/2014 (eIDAS), a qualified digital certificate is a public key certificate issued by a qualified trust service provider that ensures the authenticity and data integrity of an electronic signature and its accompanying message and/or attached data.

New!!: Authentication and Qualified digital certificate · See more »

Questioned document examination

In forensic science, questioned document examination (QDE) is the examination of documents potentially disputed in a court of law.

New!!: Authentication and Questioned document examination · See more »

QVD (software)

QVD is an open-source virtual desktop infrastructure (VDI) product built on Linux.

New!!: Authentication and QVD (software) · See more »

Race condition

A race condition or race hazard is the behavior of an electronics, software, or other system where the output is dependent on the sequence or timing of other uncontrollable events.

New!!: Authentication and Race condition · See more »

Radio-frequency identification

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

New!!: Authentication and Radio-frequency identification · See more »

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Authentication and RADIUS · See more »

Rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

New!!: Authentication and Rainbow table · See more »

Real evidence

Physical evidence (also called real evidence or material evidence) is any material object that plays some role in the matter that gave rise to the litigation, introduced as evidence in a judicial proceeding (such as a trial) to prove a fact in issue based on the object's physical characteristics.

New!!: Authentication and Real evidence · See more »

Real ID Act

The Real ID Act of 2005,, is an Act of Congress that modifies U.S. federal law pertaining to security, authentication, and issuance procedures standards for state driver's licenses and identity documents, as well as various immigration issues pertaining to terrorism.

New!!: Authentication and Real ID Act · See more »

Redmine

Redmine is a free and open source, web-based project management and issue tracking tool.

New!!: Authentication and Redmine · See more »

Referer spoofing

In HTTP networking, typically on the World Wide Web, referer spoofing (based on a canonised misspelling of "referrer") sends incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the identity of the web page previously visited by the user.

New!!: Authentication and Referer spoofing · See more »

Reflection attack

In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both directions.

New!!: Authentication and Reflection attack · See more »

Reliance authentication

Reliance authentication is a part of the trust-based identity attribution process whereby a second entity relies upon the authentication processes put in place by a first entity.

New!!: Authentication and Reliance authentication · See more »

Remote Shell

The remote shell (rsh) is a command line computer program that can execute shell commands as another user, and on another computer across a computer network.

New!!: Authentication and Remote Shell · See more »

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.

New!!: Authentication and Replay attack · See more »

Reptile (software)

Reptile is a distributed content syndication and management software with privacy protection, written by the co-creator of the Jakarta Project's Jetspeed software.

New!!: Authentication and Reptile (software) · See more »

RIFE

RIFE is a content management framework designed for rapid web application development in Java, without using J2EE.

New!!: Authentication and RIFE · See more »

Risk-based authentication

In Authentication, risk-based authentication is a non-static authentication system which takes into account the profile of the agent requesting access to the system to determine the risk profile associated with that transaction.

New!!: Authentication and Risk-based authentication · See more »

Roaming

Roaming is a wireless telecommunication term typically used with mobile devices (like mobile phones).

New!!: Authentication and Roaming · See more »

Rockstar Games

Rockstar Games, Inc. is an American video game publisher based in New York City.

New!!: Authentication and Rockstar Games · See more »

Roger Needham

Roger Michael Needham, CBE, FRS, FREng (9 February 1935 – 1 March 2003) was a British computer scientist.

New!!: Authentication and Roger Needham · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Authentication and Rootkit · See more »

S/KEY

S/KEY is a one-time password system developed for authentication to Unix-like operating systems, especially from dumb terminals or untrusted public computers on which one does not want to type a long-term password.

New!!: Authentication and S/KEY · See more »

S/MIME

S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of MIME data.

New!!: Authentication and S/MIME · See more »

Safelayer Secure Communications

Safelayer Secure Communications S.A. is a Spanish private company founded in May 1999.

New!!: Authentication and Safelayer Secure Communications · See more »

SafeNet

SafeNet, Inc. was an information security company based in Belcamp, Maryland, United States, which was acquired in August 2014 by the Dutch security company Gemalto.

New!!: Authentication and SafeNet · See more »

Samhain (software)

Samhain is an integrity checker and host intrusion detection system that can be used on single hosts as well as large, UNIX-based networks.

New!!: Authentication and Samhain (software) · See more »

SAML 1.1

Security Assertion Markup Language (SAML) is an XML standard for exchanging authentication and authorization data between security domains.

New!!: Authentication and SAML 1.1 · See more »

SAML 2.0

Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains.

New!!: Authentication and SAML 2.0 · See more »

São Paulo Museum of Art

The São Paulo Museum of Art (Museu de Arte de São Paulo, or MASP) is an art museum located on Paulista Avenue in the city of São Paulo, Brazil.

New!!: Authentication and São Paulo Museum of Art · See more »

Seal (contract law)

In the law, a seal affixed to a contract or other legal instrument has had special legal significance at various times in the jurisdictions that recognise it.

New!!: Authentication and Seal (contract law) · See more »

Seal (emblem)

A seal is a device for making an impression in wax, clay, paper, or some other medium, including an embossment on paper, and is also the impression thus made.

New!!: Authentication and Seal (emblem) · See more »

Seal of the United States Senate

The Seal of the United States Senate is the seal officially adopted by the United States Senate to authenticate certain official documents.

New!!: Authentication and Seal of the United States Senate · See more »

Sealed server

A sealed server is a server which is designed to run without users logging in.

New!!: Authentication and Sealed server · See more »

Secure access module

A Secure Access Module (or Secure Application Module) is based on SmartCard Integrated circuits and is used to enhance the security and cryptography performance in devices, commonly in devices needing to perform secure transactions, such as payment terminals.

New!!: Authentication and Secure access module · See more »

Secure by default

Security by default, in software, means that the default configuration settings are the most secure settings possible, which are not necessarily the most user friendly settings.

New!!: Authentication and Secure by default · See more »

Secure communication

Secure communication is when two entities are communicating and do not want a third party to listen in.

New!!: Authentication and Secure communication · See more »

Secure cryptoprocessor

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

New!!: Authentication and Secure cryptoprocessor · See more »

Secure messaging

Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX.

New!!: Authentication and Secure messaging · See more »

Secure Real-time Transport Protocol

The Secure Real-time Transport Protocol (SRTP) is a Real-time Transport Protocol (RTP) profile, intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications.

New!!: Authentication and Secure Real-time Transport Protocol · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: Authentication and Secure Shell · See more »

Secure Socket Tunneling Protocol

Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel.

New!!: Authentication and Secure Socket Tunneling Protocol · See more »

Secure telephone

A secure telephone is a telephone that provides voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-middle attack.

New!!: Authentication and Secure telephone · See more »

Secure-adaptive architecture

Pertaining to web services, Secure-Adaptive Architecture (SAA) refers to a particular approach towards the security management issues inherent in data transfer over computer networks, relating to certain services, such as micropayments.

New!!: Authentication and Secure-adaptive architecture · See more »

Security and safety features new to Windows Vista

There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.

New!!: Authentication and Security and safety features new to Windows Vista · See more »

Security as a service

Security as a service (SECaaS) is a business model in which a service provider integrates their security services into a corporate infrastructure on a subscription basis more cost effectively than most individuals or corporations can provide on their own, when total cost of ownership is considered.

New!!: Authentication and Security as a service · See more »

Security Assertion Markup Language

Security Assertion Markup Language (SAML, pronounced sam-el) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.

New!!: Authentication and Security Assertion Markup Language · See more »

Security bag

A security bag is a heavy duty bag used to contain high-value products or documents or legally sensitive items.

New!!: Authentication and Security bag · See more »

Security bug

A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.

New!!: Authentication and Security bug · See more »

Security engineering

Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

New!!: Authentication and Security engineering · See more »

Security printing

Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity cards.

New!!: Authentication and Security printing · See more »

Security Support Provider Interface

Security Support Provider Interface (SSPI) is a Win32 API used by Microsoft Windows systems to perform a variety of security-related operations such as authentication.

New!!: Authentication and Security Support Provider Interface · See more »

Security tape

Security tape (or security label) is a type of adhesive tape used to help reduce shipping losses due to pilfering and reduce tampering or product adulteration.

New!!: Authentication and Security tape · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Authentication and Security token · See more »

Security-focused operating system

This is a list of operating systems with a sharp security focus.

New!!: Authentication and Security-focused operating system · See more »

Self-certifying File System

In computing, Self-certifying File System (SFS) is a global and decentralized, distributed file system for Unix-like operating systems, while also providing transparent encryption of communications as well as authentication.

New!!: Authentication and Self-certifying File System · See more »

Self-service password reset

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk.

New!!: Authentication and Self-service password reset · See more »

Separation of duties

Separation of duties (SoD)(Also known as Segregation of Duties) is the concept of having more than one person required to complete a task.

New!!: Authentication and Separation of duties · See more »

Server Message Block

In computer networking, Server Message Block (SMB), one version of which was also known as Common Internet File System (CIFS), operates as an application-layer network protocol mainly used for providing shared access to files, printers, and serial ports and miscellaneous communications between nodes on a network.

New!!: Authentication and Server Message Block · See more »

Server-based signatures

In cryptography, server-based signatures are digital signatures in which a publicly available server participates in the signature creation process.

New!!: Authentication and Server-based signatures · See more »

Service authentication

Service authentication refers to the identity verification process from the service provider to the user.

New!!: Authentication and Service authentication · See more »

Service-oriented programming

Service-oriented programming (SOP) is a programming paradigm that uses "services" as the unit of computer work, to design and implement integrated business applications and mission critical software programs.

New!!: Authentication and Service-oriented programming · See more »

Session Announcement Protocol

Session Announcement Protocol (SAP) is an experimental protocol for broadcasting multicast session information.

New!!: Authentication and Session Announcement Protocol · See more »

Session hijacking

In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.

New!!: Authentication and Session hijacking · See more »

Session layer

In the seven-layer OSI model of computer networking, the session layer is layer 5.

New!!: Authentication and Session layer · See more »

Shell Control Box

Shell Control Box (SCB) is a network security appliance that controls privileged access to remote IT systems, records activities in replayable audit trails, and prevents malicious actions.

New!!: Authentication and Shell Control Box · See more »

Shibboleth (Shibboleth Consortium)

Shibboleth is a single sign-on (log-in) system for computer networks and the Internet.

New!!: Authentication and Shibboleth (Shibboleth Consortium) · See more »

Shoulder surfing (computer security)

In computer security, shoulder surfing is a type of social engineering technique used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.

New!!: Authentication and Shoulder surfing (computer security) · See more »

Signcryption

In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption.

New!!: Authentication and Signcryption · See more »

Signing of the United States Constitution

The Signing of the United States Constitution occurred on September 17, 1787, at Independence Hall in Philadelphia, Pennsylvania, when 39 delegates to the Constitutional Convention, representing 12 states (all but Rhode Island, which declined to send delegates), endorsed the Constitution created during the four-month-long convention.

New!!: Authentication and Signing of the United States Constitution · See more »

Simple Authentication and Security Layer

Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols.

New!!: Authentication and Simple Authentication and Security Layer · See more »

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.

New!!: Authentication and Simple Mail Transfer Protocol · See more »

Simple Network Management Protocol

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

New!!: Authentication and Simple Network Management Protocol · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Authentication and Single sign-on · See more »

Single-page application

A single-page application (SPA) is a web application or web site that interacts with the user by dynamically rewriting the current page rather than loading entire new pages from a server.

New!!: Authentication and Single-page application · See more »

SIP extensions for the IP Multimedia Subsystem

The Session Initiation Protocol (SIP) is the signaling protocol selected by the 3rd Generation Partnership Project (3GPP) to create and control multimedia sessions with two or more participants in the IP Multimedia Subsystem (IMS), and therefore is a key element in the IMS framework.

New!!: Authentication and SIP extensions for the IP Multimedia Subsystem · See more »

Situated learning

Situated learning is a theory on how individuals acquire professional skills, extending research on apprenticeship into how legitimate peripheral participation leads to membership in a community of practice.

New!!: Authentication and Situated learning · See more »

SlickLogin

SlickLogin is an Israeli start-up company that develops sound-based password alternatives.

New!!: Authentication and SlickLogin · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Authentication and Smart card · See more »

Smart key

A smart key is an electronic access and authorization system that is available either as standard equipment or as an option in several car models.

New!!: Authentication and Smart key · See more »

Smart Personal Objects Technology

The Smart Personal Objects Technology (SPOT) is a discontinued initiative by Microsoft to create intelligent and personal home appliances, consumer electronics, and other objects through new hardware capabilities and software features.

New!!: Authentication and Smart Personal Objects Technology · See more »

Smartmatic

Smartmatic (also referred as Smartmatic Corp. or Smartmatic International); is a Venezuelan-owned multinational company that specializes in technology solutions aimed at governments.

New!!: Authentication and Smartmatic · See more »

SmoothWall

Smoothwall is a Linux distribution designed to be used as an open source firewall.

New!!: Authentication and SmoothWall · See more »

SMS

SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.

New!!: Authentication and SMS · See more »

SMTPS

SMTPS (Simple Mail Transfer Protocol Secure) is a deprecated method for securing SMTP with transport layer security.

New!!: Authentication and SMTPS · See more »

Social login

Social login is a form of single sign-on using existing information from a social networking service such as Facebook, Twitter or Google+, to sign into a third party website instead of creating a new login account specifically for that website.

New!!: Authentication and Social login · See more »

Social Security number

In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as.

New!!: Authentication and Social Security number · See more »

SOCKS

SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.

New!!: Authentication and SOCKS · See more »

Software token

A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the use of computer services.

New!!: Authentication and Software token · See more »

SPIP

SPIP (Système de Publication pour l'Internet) is a free software content management system designed for web site publishing, oriented towards online collaborative editing.

New!!: Authentication and SPIP · See more »

SPNEGO

Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO), often pronounced "spenay-go", is a GSSAPI "pseudo mechanism" used by client-server software to negotiate the choice of security technology.

New!!: Authentication and SPNEGO · See more »

Spring Framework

The Spring Framework is an application framework and inversion of control container for the Java platform.

New!!: Authentication and Spring Framework · See more »

Spring Security

Spring Security is a Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications.

New!!: Authentication and Spring Security · See more »

SQRL

SQRL (pronounced "squirrel") or Secure, Quick, Reliable Login (formerly Secure QR Login) is a draft open standard for secure website login and authentication.

New!!: Authentication and SQRL · See more »

SquidGuard

SquidGuard is a URL redirector software, which can be used for content control of websites users can access.

New!!: Authentication and SquidGuard · See more »

SSL-Explorer: Community Edition

SSL-Explorer: Community Edition was an open source SSL VPN product developed by 3SP Ltd, a company acquired by Barracuda Networks.

New!!: Authentication and SSL-Explorer: Community Edition · See more »

SSLIOP

In distributed computing, SSLIOP is an Internet Inter-ORB Protocol (IIOP) over Secure Sockets Layer (SSL), providing confidentiality and authentication.

New!!: Authentication and SSLIOP · See more »

Storage Resource Broker

Storage Resource Broker (SRB) was data grid management computer software used in computational science research projects.

New!!: Authentication and Storage Resource Broker · See more »

StrongSwan

strongSwan is a multiplatform IPsec implementation.

New!!: Authentication and StrongSwan · See more »

Superuser

In computing, the superuser is a special user account used for system administration.

New!!: Authentication and Superuser · See more »

SURFnet

SURFnet is an organisation that develops, implements and maintains the national research and education network (NREN) of the Netherlands, and is also the name of the network it operates.

New!!: Authentication and SURFnet · See more »

System Security Services Daemon

The System Security Services Daemon (SSSD) is a software package originally developed for the Linux operating system (OS) that provides a set of daemons to manage access to remote directories and authentication mechanisms.

New!!: Authentication and System Security Services Daemon · See more »

Systems engineering

Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design and manage complex systems over their life cycles.

New!!: Authentication and Systems engineering · See more »

TCP reset attack

TCP reset attack, also known as "forged TCP resets", "spoofed TCP reset packets" or "TCP reset attacks", is a way to tamper and terminate the Internet connection by sending forged TCP reset packet.

New!!: Authentication and TCP reset attack · See more »

Tcpcrypt

In computer networking, tcpcrypt is a transport layer communication encryption protocol.

New!!: Authentication and Tcpcrypt · See more »

Telegram (service)

Telegram is a cloud-based instant messaging and voice over IP service developed by Telegram Messenger LLP, a privately held company registered in London, United Kingdom, founded by the Russian entrepreneur Pavel Durov.

New!!: Authentication and Telegram (service) · See more »

Telephone banking

Telephone banking is a service provided by a bank or other financial institution, that enables customers to perform over the telephone a range of financial transactions which do not involve for cash or documents (such as cheques), without the need to visit a bank branch or ATM.

New!!: Authentication and Telephone banking · See more »

Tenth Letter (Plato)

The Tenth Letter of Plato, also known as Epistle X or Letter X, is an epistle that tradition has ascribed to Plato.

New!!: Authentication and Tenth Letter (Plato) · See more »

Text to speech in digital television

Text to speech in digital television refers to digital television products that use speech synthesis (computer generated speech providing a product that “talks” to the end user) to enable access by blind or partially sighted people.

New!!: Authentication and Text to speech in digital television · See more »

The Bat!

The Bat! is a shareware email client for the Microsoft Windows operating system, developed by Ritlabs, SRL, a company based in Chişinău, Moldova.

New!!: Authentication and The Bat! · See more »

The Beast (Revelation)

The Beast (Θηρίον, Thērion) may refer to one of two beasts described in the Book of Revelation.

New!!: Authentication and The Beast (Revelation) · See more »

Theoretical computer science

Theoretical computer science, or TCS, is a subset of general computer science and mathematics that focuses on more mathematical topics of computing and includes the theory of computation.

New!!: Authentication and Theoretical computer science · See more »

ThinkPad Tablet

The ThinkPad Tablet is a tablet computer made by Lenovo as part of its series of Android-based tablet devices and is targeted towards business users.

New!!: Authentication and ThinkPad Tablet · See more »

Third-party grading

Third Party Grading (TPG) refers to coin grading, authentication, attribution, and encapsulation by independent certification services.

New!!: Authentication and Third-party grading · See more »

Three-pass protocol

In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys.

New!!: Authentication and Three-pass protocol · See more »

Ticket (IT security)

In IT Security, a ticket is a number generated by a network server for a client, which can be delivered to itself, or a different server as a means of authentication or proof of authorization, and cannot easily be forged.

New!!: Authentication and Ticket (IT security) · See more »

Ticket Granting Ticket

In some computer security systems, a Ticket Granting Ticket or Ticket to Get Tickets (TGT) is a small, encrypted identification file with a limited validity period.

New!!: Authentication and Ticket Granting Ticket · See more »

Time-based authentication

Time-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its presence at a scheduled time of day or within a scheduled time interval and on a distinct location.

New!!: Authentication and Time-based authentication · See more »

TLS-PSK

Transport Layer Security pre-shared key ciphersuites (TLS-PSK) is a set of cryptographic protocols that provide secure communication based on pre-shared keys (PSKs).

New!!: Authentication and TLS-PSK · See more »

Transaction authentication number

A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords to authorize financial transactions.

New!!: Authentication and Transaction authentication number · See more »

Translating for legal equivalence

Translating for legal equivalence is the production of translations that are acceptable by a legal jurisdiction.

New!!: Authentication and Translating for legal equivalence · See more »

Trillian (software)

Trillian is a proprietary multiprotocol instant messaging application for Microsoft Windows, Mac OS X, Linux, Android, iOS, BlackBerry OS, and the Web, created by Cerulean Studios.

New!!: Authentication and Trillian (software) · See more »

Trust service provider

A trust service provider is a person or legal entity providing and preserving digital certificates to create and validate electronic signatures and to authenticate their signatories as well as websites in general.

New!!: Authentication and Trust service provider · See more »

Trusted Platform Module

Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

New!!: Authentication and Trusted Platform Module · See more »

Twelfth Letter

The Twelfth Letter of Plato, also known as Epistle XII or Letter XII, is an epistle that tradition has ascribed to Plato, though it is almost certainly a literary forgery.

New!!: Authentication and Twelfth Letter · See more »

TWiki

TWiki is a Perl-based structured wiki application, typically used to run a collaboration platform, knowledge or document management system, a knowledge base, or team portal.

New!!: Authentication and TWiki · See more »

UMTS security

The Universal Mobile Telecommunications System (UMTS) is one of the new ‘third generation’ 3G mobile cellular communication systems.

New!!: Authentication and UMTS security · See more »

United States Constitution

The United States Constitution is the supreme law of the United States.

New!!: Authentication and United States Constitution · See more »

Univention Corporate Server

Univention Corporate Server (UCS) is a server operating system derived from Debian GNU/Linux with an integrated management system for the central and cross-platform administration of servers, services, clients, desktops and users as well as virtualized computers operated in UCS.

New!!: Authentication and Univention Corporate Server · See more »

Universal composability

The framework of universal composability (UC) is a general-purpose model for the analysis of cryptographic protocols.

New!!: Authentication and Universal composability · See more »

Universal Plug and Play

Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.

New!!: Authentication and Universal Plug and Play · See more »

University Computing Centre

The University Computing Centre in Zagreb (Sveučilišni računski centar, abbreviated Srce, which also means "heart") has a long tradition in the area of information and communication technologies.

New!!: Authentication and University Computing Centre · See more »

University of Cambridge Computing Service

The University of Cambridge Computing Service provided computing facilities across the University of Cambridge between 1970 and 2014.

New!!: Authentication and University of Cambridge Computing Service · See more »

University of Rochester

The University of Rochester (U of R or UR) frequently referred to as Rochester, is a private research university in Rochester, New York.

New!!: Authentication and University of Rochester · See more »

Unverified personal gnosis

Unverified personal gnosis (often abbreviated UPG) is the phenomenological concept that an individual's spiritual insights (or gnosis) may be valid for them without being generalizable to the experience of others.

New!!: Authentication and Unverified personal gnosis · See more »

Usability of web authentication systems

Usability of web authentication systems refers to the efficiency and user acceptance of online authentication systems.

New!!: Authentication and Usability of web authentication systems · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Authentication and User (computing) · See more »

V-Key

V-Key is a software-based digital security solutions provider.

New!!: Authentication and V-Key · See more »

Vadim the Bold

Vadim the Bold was a legendary chieftain of the Ilmen Slavs who led their struggle against Rurik and the Varangians in the 9th century.

New!!: Authentication and Vadim the Bold · See more »

Validation of foreign studies and degrees

The Validation or recognition of foreign studies and degrees is the process whereby a competent authority in one country formally recognises the value of a qualification from a foreign country.

New!!: Authentication and Validation of foreign studies and degrees · See more »

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

New!!: Authentication and ValidSoft · See more »

Value judgment

A value judgment (or value judgement) is a judgment of the rightness or wrongness of something or someone, or of the usefulness of something or someone, based on a comparison or other relativity.

New!!: Authentication and Value judgment · See more »

Vapor (web framework)

Vapor is an open source web framework written in Swift.

New!!: Authentication and Vapor (web framework) · See more »

Verification

Verify or verification may refer to.

New!!: Authentication and Verification · See more »

Verification and validation

Verification and validation are independent procedures that are used together for checking that a product, service, or system meets requirements and specifications and that it fulfills its intended purpose.

New!!: Authentication and Verification and validation · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Authentication and Virtual private network · See more »

Voice over IP

Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.

New!!: Authentication and Voice over IP · See more »

VQP

The VLAN Query Protocol (VQP) was developed by Cisco and allows end-devices on LANs to be authenticated via their MAC address and an appropriate VLAN attributed to the port, using a VLAN Management Policy Server (VMPS).

New!!: Authentication and VQP · See more »

Weak key

In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way.

New!!: Authentication and Weak key · See more »

Weapons of the Vietnam War

This article is about the weapons used in the Vietnam War, which involved the People’s Army of Vietnam (PAVN) or North Vietnamese Army (NVA), National Liberation Front for South Vietnam (NLF) or Viet Cong (VC), and the armed forces of the Army of the Republic of Vietnam (ARVN), United States, Republic of Korea, Philippines, Thailand, and the Australian, New Zealand defence forces, and a variety of irregular troops.

New!!: Authentication and Weapons of the Vietnam War · See more »

Web access management

Web access management (WAM) is a form of identity management that controls access to web resources, providing authentication management, policy-based authorizations, audit and reporting services (optional) and single sign-on convenience.

New!!: Authentication and Web access management · See more »

Web API security

Web API security entails authenticating programs or users who are invoking an web API.

New!!: Authentication and Web API security · See more »

Web archiving

Web archiving is the process of collecting portions of the World Wide Web to ensure the information is preserved in an archive for future researchers, historians, and the public.

New!!: Authentication and Web archiving · See more »

Web browsing history

In computing, the web browsing history is the list of web pages a user has visited recently—and associated data such as page title and time of visit—which is recorded by web browser software as standard for a certain period of time.

New!!: Authentication and Web browsing history · See more »

Web cryptography API

The Web Cryptography API is the World Wide Web Consortium’s (W3C) recommendation for a low-level interface that would increase the security of web applications by allowing them to perform cryptographic functions without having to access raw keying material.

New!!: Authentication and Web cryptography API · See more »

Web framework

A web framework (WF) or web application framework (WAF) is a software framework that is designed to support the development of web applications including web services, web resources, and web APIs.

New!!: Authentication and Web framework · See more »

Web of trust

In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between a public key and its owner.

New!!: Authentication and Web of trust · See more »

Web Services Discovery

Web Services Discovery provides access to software systems over the Internet using standard protocols.

New!!: Authentication and Web Services Discovery · See more »

Web2py

Web2py is an open source web application framework written in the Python programming language.

New!!: Authentication and Web2py · See more »

WebID

WebID gives one way to log into an internet service.

New!!: Authentication and WebID · See more »

Wide Mouth Frog protocol

The Wide-Mouth Frog protocol is a computer network authentication protocol designed for use on insecure networks (the Internet for example).

New!!: Authentication and Wide Mouth Frog protocol · See more »

Wiki

A wiki is a website on which users collaboratively modify content and structure directly from the web browser.

New!!: Authentication and Wiki · See more »

Windows Media Services

Windows Media Services (WMS) is a streaming media server from Microsoft that allows an administrator to generate streaming media (audio/video).

New!!: Authentication and Windows Media Services · See more »

Wireless Broadband Alliance

The Wireless Broadband Alliance (WBA) is an industry association formed to promote interoperability between operators in the Wi-Fi industry, with the stated aim of providing an excellent user experience.

New!!: Authentication and Wireless Broadband Alliance · See more »

Wireless lock

Wireless lock is a protection concept for authenticated LAN or WLAN network clients offered from various vendors in various functional shapes and physical designs.

New!!: Authentication and Wireless lock · See more »

Wireless network interface controller

A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless radio-based computer network, rather than a wired network, such as Token Ring or Ethernet.

New!!: Authentication and Wireless network interface controller · See more »

Wireless security

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

New!!: Authentication and Wireless security · See more »

Wireless WAN

A wireless wide area network (WWAN), is a form of wireless network.

New!!: Authentication and Wireless WAN · See more »

Woo–Lam

In cryptography, Woo–Lam refers to various computer network authentication protocols designed by Simon S. Lam and Thomas Woo.

New!!: Authentication and Woo–Lam · See more »

X Window System core protocol

The X Window System core protocolRobert W. Scheifler and James Gettys: X Window System: Core and extension protocols, X version 11, releases 6 and 6.1, Digital Press 1996, RFC 1013Grant Edwards.

New!!: Authentication and X Window System core protocol · See more »

XPS Annotator

XPS Annotator is a document management software program for Microsoft Windows that allows users to view, annotate, convert, sign and print XPS documents.

New!!: Authentication and XPS Annotator · See more »

XTS-400

The XTS-400 is a multilevel secure computer operating system.

New!!: Authentication and XTS-400 · See more »

Zero-knowledge password proof

In cryptography, a zero-knowledge password proof (ZKPP) is an interactive method for one party (the prover) to prove to another party (the verifier) that it knows a value of a password, without revealing anything other than the fact that it knows that password to the verifier.

New!!: Authentication and Zero-knowledge password proof · See more »

Zero-knowledge proof

In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party (the prover Peggy) can prove to another party (the verifier Victor) that she knows a value x, without conveying any information apart from the fact that she knows the value x. Another way of understanding this would be: Interactive zero-knowledge proofs require interaction between the individual (or computer system) proving their knowledge and the individual validating the proof.

New!!: Authentication and Zero-knowledge proof · See more »

.htaccess

A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, used for configuration of site-access issues, such as URL redirection, URL shortening, Access-security control (for different webpages and files), and more.

New!!: Authentication and .htaccess · See more »

24 (season 2)

The second season of the American drama television series 24, also known as Day 2, was first broadcast from October 29, 2002, to May 20, 2003 on Fox.

New!!: Authentication and 24 (season 2) · See more »

3GPP

The 3rd Generation Partnership Project (3GPP) is a collaboration between groups of telecommunications standards associations, known as the Organizational Partners.

New!!: Authentication and 3GPP · See more »

Redirects here:

AuthN, Authenticate, Authenticated, Authenticated copy, Authenticates, Authenticating, Authentication factor, Authentication factors, Authentications, Authentification, Authn, Client authentication, Forgery detection, Server authentication.

References

[1] https://en.wikipedia.org/wiki/Authentication

OutgoingIncoming
Hey! We are on Facebook now! »