Items Tagged with "Authentication"


634ff692af43fd4dc5dab3b8590c77d6

Under illumination variations, exploiting 3D image for ‘Face Authentication’ in Biometrics…

May 02, 2010 Added by:K S Abhiraj

This article shows some of the basic techniques through which, Biometic authentication worked before.. and a basic mean how it could be crooked up, for gaining authentication. Automatic recognition of human faces is extremely useful in a wide area of applications, such as face identification for security and access control, surveillance of public places, mug shot matching and other commerc...

Comments  (0)

D97bed96d5646177251e99b9567b1392

Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Enhanced Authentication Now Available on Infosec Island

February 17, 2010 Added by:Infosec Island Admin

Infosec Island™, the new community for IT and information security professionals, today announced that its new enhanced authentication service based on the SyferLock™ GridGuard™ solution, is now live.

Comments  (5)

A3e8b5e0becdbfb1b1c706b452b6c388

Road Map for an Application/Software Security Architect (Part 5)

December 30, 2009 Added by:Stephen Primost

Without a Digital Identity, how would you expect to do any authentication? And with an incomplete Digital Identity, how would you expect to get the authorization done correctly? Without the proper data model and the expectation that it would have the correct data (besides being in the right place at the right time), securing a system is impossible, although having the information, it is the easies...

Comments  (0)


From the Web

DNSSEC + Certs As a Replacement For SSL’s Transport Security

October 15, 2009 from: Rsnake's blog at ha.ckers.org

RSnake discusses the feasability of using DNSSEC to provide transport-layer security in a more reliable fashion than the current SSL Certificate Authority site authentication model.

Comments  (0)


From the Web

All about Website Password Policies

October 07, 2009 from: Jeremiah Grossman's Blog

Passwords are the most common way for people to prove to a website that they are who they say they are, as they should be the only ones who know what it is. That is of course unless they share it with someone else, somebody steals it, or even possibly guesses it. This identity verification process is more commonly know as “authentication.”

Comments  (0)


From the Web

Hacking Two-Factor Authentication

September 22, 2009 from: hackyourself.net

The failure of two-factor authentication and two new attacks: Man-in-the-middle and Trojan attacks both can circumvent two-factor authentication.

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »