Xem 1-20 trên 690 kết quả Authentication
  • Tài lieuj tham khảo Kỹ thuật xử lý Authentication trong Sharepoint Server

    doc11p phucmtsd 12-07-2010 167 54   Download

  • Security Form Authentication là phương thức giúp đảm bảo an toàn cho các ứng dụng ASP.NET. Nó đóng vai trò quan trọng trong việc đảm bảo an ninh bảo mật công nghệ thông tin. Và để hiểu rõ hơn về điều này mời các bạn tham khảo bài giảng ASP.NET Security Form Authentication sau đây.

    pdf24p cocacola_10 02-12-2015 60 6   Download

  • will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos – a private-key authentication service then X.509 directory authentication service

    ppt23p muathu_102 28-01-2013 40 3   Download

  • We have looked at confidentiality services, and also examined the information theoretic framework for security.

    ppt33p muathu_102 28-01-2013 60 3   Download

  • In this chapter, you learned to: Explain the funtion and operation of the authentication, authorization, and accounting (AAA) protocol; configure a Cisco router to perform AAA authentication with a local database; describe how to configure Cisco ACS to support AAA for Cisco IOS routers; configure server-base AAA.

    pdf78p youcanletgo_01 04-01-2016 29 3   Download

  • Tham khảo bài thuyết trình 'data authentication part ii', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    ppt29p muathu_102 28-01-2013 40 2   Download

  • Objectives of Chapter 11: To define message integrity; to define message authentication; to define criteria for a cryptographic hash function; to define the Random Oracle Model and its role in evaluating the security of cryptographic hash functions; to distinguish between an MDC and a MAC; to discuss some common MACs.

    pdf7p levuphongqn 18-08-2015 38 2   Download

  • Objectives of Chapter 14: To distinguish between message authentication and entity authentication; to define witnesses used for identification; to discuss some methods of entity authentication using a password; to introduce some challenge-response protocols for entity authentication; to introduce some zero-knowledge protocols for entity authentication; to define biometrics and distinguish between physiological and behavioral techniques.

    pdf7p levuphongqn 18-08-2015 51 2   Download

  • Authentication And Threats and Attacks to information security, polices and laws includes about Definition, Some basic authentication methods, Authentication Protocols, Kerberos-An security protocols in the real world.

    ppt67p cocacola_17 11-12-2015 48 2   Download

  • The contents are presented in chapter 7: Define authentication, authentication credentials, authentication models, authentication servers, extended authentication protocols, Virtual Private Network (VPN). Inviting you to refer.

    ppt54p kiepnaybinhyen_02 25-12-2015 27 2   Download

  • Bài giảng Lập trình WebForm này trình bày những kiến thức về forms authentication. Nội dung chính trong bài gồm có: Forms Authentication? Cách thức thực thi, demo minh họa. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.

    ppt25p nhanmotchut_4 01-11-2016 32 2   Download

  • With the light that literature has shed on the merits of authentic videos, this paper aims to foreground two video input enhancement activities, namely annotating and captioning and argue that when embedded in authentic videos, annotations and captions aid EFL learners’ vocabulary acquisition and thus English listening comprehension.

    pdf8p vicross2711 20-06-2019 40 2   Download

  • Keeping in the view, the importance of the authentication systems, we analyze various authentication techniques in our paper. And try to find out various advantages and disadvantages of various authentication systems. This paper gives the emphasis on the various issues involved in the various authentication techniques.

    pdf10p girlsseek 27-02-2019 12 1   Download

  • This paper evaluates different authentication methods for online banking in Parsian Bank, which is one of the biggest private banks in Iran. The study designs a questionnaire and distributes it among some experts to find cause and effect factors based on a multi-criteria decision making technique named Decision Making Trial And Evaluation Laboratory (DEMATEL).

    pdf6p kelseynguyen 28-05-2020 11 1   Download

  • "Ebook A2 flyers 3 Student's book: Authentic examination papers" authentic examination papers for learners preparing for the revised Pre A1 Starters, A1 Movers and A2 Flyers exams as introduced in 2018. This collection of examination papers for A2 Flyers provides ideal exam practice. It contains three full-colour test papers which contain engaging activities and attractive illustrations to motivate young learners. These papers also provide an excellent opportunity for children, parents and teachers alike to familiarise themselves with the format of the revised test.

    pdf77p thinfilmvacuum 18-02-2021 53 6   Download

  • In this paper, the authors present a multimodal biometric system using face and fingerprint features with the incorporation of Zernike Moment (ZM) and Radial Basis Function (RBF) Neural Network for personal authentication.

    pdf12p girlsseek 27-02-2019 22 0   Download

  • In this paper, the authors present a hybrid multibiometric authentication person system that integrates both multi modal and multi algorithmic. Multi-modal, the system using face and fingerprint features, has long been considered common in personal authentication. Multi-algorithm is the system which uses Circularly Orthogonal Moments, such as Zernike Moment (ZM), Pseudo Zernike Moment (PZM), Polar Cosine Transform (PCT) and Radial Basis Function (RBF) Neural Networks. These moments are widely used because their magnitudes are invariant to image rotation, scaling and noise.

    pdf6p girlsseek 27-02-2019 9 0   Download

  • In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device.

    pdf4p byphasse043256 21-03-2019 12 0   Download

  • This paper proposes a Hybrid Improved Bacterial Swarm (HIBS) optimization algorithm for the minimization of Equal Error Rate (EER) as a performance measure in a hand-based multimodal biometric authentication system. The hybridization of the algorithm was conducted by incorporating Bacterial Foraging Optimization (BFO) and Particle Swarm Optimization (PSO) algorithm to mitigate weaknesses in slow and premature convergence.

    pdf19p meriday 20-04-2019 12 0   Download

  • In this paper, we propose a novel technique that uses fingerprint features with coordinates (x, y), angle and type of feature as watermark information for authentication in H.264/AVC video.

    pdf14p vititan2711 13-08-2019 6 0   Download


320 tài liệu
1052 lượt tải


nocache searchPhinxDoc


Đồng bộ tài khoản