Directory > Computers > Security > Authentication DigiGAN, Inc Secure network gateway, web server and one time password solutions. Product information and company profile. http://www.digigan.com/ Reviews Rating: Not yet Rated
Whois Check
NMA, Inc. ZSentry two-factor authentication solution. Product information, white papers and contact details. http://www.nma.com/ Reviews Rating: Not yet Rated
Whois Check
M-Tech Information Technology, Inc. ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details. http://mtechit.com/ Reviews Rating: Not yet Rated
Whois Check
Dos and Don'ts of Client Authentication on the Web Paper by Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster. In the Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. [PDF] http://www.pdos.lcs.mit.edu/papers/webauth:sec10.pdf Reviews Rating: Not yet Rated
Whois Check
Increasing Availability and Security of an Authentication Service Paper by L. Gong. Published in the IEEE Journal on Selected Areas in Communications, Vol.11, No.5, June, 1993. [Gziped Postscript]. http://java.sun.com/people/gong/papers/distributed-auth.ps.gz Reviews Rating: Not yet Rated
Whois Check
Protecting Poorly Chosen Secrets from Guessing Attacks Paper by L. Gong, T.M.A. Lomas, R.M. Needham, and J.H. Saltzer (1993). Examines common forms of guessing attacks, develops examples of cryptographic protocols that are immune to such attacks, and suggests a systematic way to examine protocols to detect vulnerabilities to such attacks. [Gziped Postscript] http://java.sun.com/people/gong/papers/password-guessing.ps.gz Reviews Rating: Not yet Rated
Whois Check
Password Management Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques. [PDF] http://seclab.cs.ucdavis.edu/papers/pdfs/mb-91.pdf Reviews Rating: Not yet Rated
Whois Check
A Proactive Password Checker Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript] http://seclab.cs.ucdavis.edu/papers/mb91c.ps Reviews Rating: Not yet Rated
Whois Check
Motus Technologies Develops software based on cryptography and the use of smart cards to secure storage of, access to and transmission of confidential data. http://www.motus.com/ Reviews Rating: Not yet Rated
Whois Check
I/O Software Provider of software solutions, including biometric solutions. Site includes product descriptions and technology licensing terms. http://www.iosoftware.com/ Reviews Rating: Not yet Rated
Whois Check
iT_SEC A switzerland-based company providing consulting services. Tri-lingual site describes their philosophy, and answers questions about their technologies. http://www.it-sec.com/index_e.php Reviews Rating: Not yet Rated
Whois Check
Remote User Authentication in Libraries Comprehensive collection of resources for libraries and universities. Includes links to software and some links of interest to non-librarians. http://library.smc.edu/rpa.htm Reviews Rating: Not yet Rated
Whois Check
Flicks Software Software password protects web content (Windows NT / 2000). Free trial downloads available. http://www.flicks.com Reviews Rating: Not yet Rated
Whois Check
SeqID, Inc. Offers organizations subscription-based strong authentication and access management security for critical web-based applications, content & VPN services. Product and corporate information. http://www.seqid.com Reviews Rating: Not yet Rated
Whois Check
iDEX Systems, Inc. Java-powered iButton based personal identity management security services and digital certificate authentication for secure logon, secure messaging, and digital signatures. http://www.idexsys.com Reviews Rating: Not yet Rated
Whois Check
NexRealm Software Makers of a system which continuously assesses usage patterns, and interrupts Windows NT sessions if the pattern deviates from the authorized user's pattern. Site makes heavy use of sound and graphics. http://www.nexrealm.com Reviews Rating: Not yet Rated
Whois Check
iisPROTECT Functions with Internet Information Server to secure web sites. Includes live demo. http://www.iisPROTECT.com/ Reviews Rating: Not yet Rated
Whois Check
IIS User Authentication Tutorial Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots. http://www.authenticationtutorial.com/ Reviews Rating: Not yet Rated
Whois Check
SecureUser.net Providers of tools to e-commerce developers. Site includes a technology explanation and case studies. http://www.SecureUser.net Reviews Rating: Not yet Rated
Whois Check
Vasco Makers of both software and hardware systems. Demos, case studies and product information. http://www.vasco.com/ Reviews Rating: Not yet Rated
Whois Check
Theory of Identification and Authentication History and development of mechanisms and techniques. http://www.geocities.com/SiliconValley/Garage/3323/cspage.html Reviews Rating: Not yet Rated
Whois Check
RSA Security Products include token-based one time password systems and single sign on systems. Site contains information on security. http://www.rsasecurity.com/ Reviews Rating: Not yet Rated
Whois Check
Ankari Offers authentication, network security software, and IT security solutions. Includes white papers and introductory material. http://www.ankari.com/ Reviews Rating: Not yet Rated
Whois Check
Pluggable Authentication Modules Sun's official PAM documentation. Programmer documentation and source code. http://www.sun.com/solaris/pam/ Reviews Rating: Not yet Rated
Whois Check
Unisys Makers of several related products. Site includes rationale as well as comprehensive usage information. http://www.unisys.com/ Reviews Rating: Not yet Rated
Whois Check
Blockade Systems Password synchronization and enterprise-wide access control management software. Includes a return-on-investment calculator. http://www.blockade.com/ Reviews Rating: Not yet Rated
Whois Check
Secure Remote Passwords Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code. http://srp.stanford.edu/ Reviews Rating: Not yet Rated
Whois Check
Open Systems Management Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs. http://www.osmcorp.com/ Reviews Rating: Not yet Rated
Whois Check
BioPassword A software-based technology that learns and verifies unique typing patterns. Includes an introduction to biometrics and keyboard dynamics. http://www.biopassword.com/ Reviews Rating: Not yet Rated
Whois Check
|