Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.
Browse AAA - MAM
-
- AAA - Authentication, authorization, and accounting (AAA) is a framework for ...
- active man in the middle attack - Active man-in-t...
- active man-in-the-middle attack - Active man-in-t...
- active man-in-the-middle attack (MitM)
- AIDC - Automatic Identification and Data Capture (AIDC) is a broad set of te...
- authenticate - Authentication is the process of determining whether ...
- authentication - Authentication is the process of determining whet...
- authentication authorization accounting
- authentication server - An authentication server is an appl...
- authentication ticket - An authentication ticket, also know...
- authentication ticket or ticket-granting ticket...
- authentication, authorization, and accounting (...
- Automatic Identification and Data Capture
- Automatic Identification and Data Capture (AIDC)
- biometric authentication - Biometric verification is any...
- biometric identification - Biometric verification is any...
- biometric verification - Biometric verification is any mea...
- CAC - A common access card (CAC) is a Unites States Department of Defense (Do...
- capacitive scanner - A capacitive scanner is a fingerscanning ...
- CloudAV - CloudAV is a program that combines multiple antivirus applicati...
- common access card - A common access card (CAC) is a Unites St...
- common access card (CAC) - A common access card (CAC) is...
- connection broker - In desktop virtualization, a connection bro...
- Data Security Council of India - The Data Security...
- Data Security Council of India (DSCI) - The...
- digest authentication - Digest authentication is a method o...
- disposable email - What is a disposable email?Disposable email i...
- DSCI - The Data Security Council of India (DSCI) is a not-for-profit organiz...
- E-voting Glossary - This glossary provides short definitions of...
- EAP - The Extensible Authentication Protocol (EAP) is a protocol for wireless...
- EIM - Enterprise Identity Mapping (EIM) is an open architecture from IBM for ...
- encryption key management - Encryption key management i...
- endpoint fingerprinting - Endpoint fingerprinting is a fe...
- enhanced driver's license (EDL) - An enhanced dri...
- Enterprise Identity Mapping - Enterprise Identity Map...
- Enterprise Identity Mapping (EIM) - Enterprise ...
- Extensible Authentication Protocol - The Exten...
- Extensible Authentication Protocol (EAP)
- facial recognition - Facial recognition (or face recognition) ...
- FDE - What is full-disk encryption (FDE)?Full-disk encryption (FDE) is encryp...
- federated identity management - Federated Identity ...
- federated identity management (FIM) - Federat...
- FIM - Federated Identity Management (FIM) is an arrangement that can be made ...
- finger vein ID - Finger vein ID is a biometric authentication syst...
- Firesheep - Firesheep is a Firefox plug-in that automates session hijac...
- full disk encryption - What is full-disk encryption (FDE)?Fu...
- full-disk encryption - What is full-disk encryption (FDE)?Fu...
- full-disk encryption (FDE) - What is full-disk encrypt...
- graphical password - A graphical password is an authentication...
- graphical password or graphical user authentica...
- graphical user authentication - A graphical passwor...
- GUA - A graphical password is an authentication system that works by having t...
- gummy bear hack - A gummy bear hack is an attempt to fool a biome...
- hackerazzi - Hackerazzi are cybercriminals who hack into the email acc...
- Hash based Message Authentication Code
- Hash-based Message Authentication Code
- Hash-based Message Authentication Code (HMAC)
- HAVA - The Help America Vote Act of 2002 (HAVA)is a federal program that ref...
- HAVA (Help America Vote Act of 2002) - The H...
- Help America Vote Act of 2002 - The Help America Vo...
- HMAC - Hash-based Message Authentication Code (HMAC) is a message authentica...
- IAM - Integrated access management (IAM) is a combination of business process...
- IAM system - An identity management access (IAM) system is a framework...
- ID management - Identity management (ID management) is a broad admi...
- IDaaS - Identity as a Service (IDaaS) is an authentication infrastructure t...
- identity access management (IAM) system
- identity access management system - An identity...
- identity as a Service - Identity as a Service (IDaaS) is an...
- identity as a Service (IDaaS) - Identity as a Servi...
- identity card - A national identity card is a portable document, ty...
- identity chaos - Identity chaos (sometimes called password chaos) ...
- identity chaos (password chaos) - Identity chaos ...
- identity federation - Federated Identity Management (FIM) is ...
- identity management - Identity management (ID management) is ...
- identity management (ID management) - Identit...
- identity theft - According to the Identity Theft Resource Center, ...
- iJacking - According to the Identity Theft Resource Center, identity the...
- initialization vector - An initialization vector (IV) is an...
- initialization vector (IV) - An initialization vector ...
- integrated access management - Integrated access man...
- integrated access management (IAM) - Integrate...
- intelligent video - Intelligent video is digital video technolo...
- iris recognition - Iris recognition is a method of identifying p...
- ISO/IEC 38500 - ISO/IEC 38500 is an international standard created ...
- IV - An initialization vector (IV) is an arbitrary number that can be used alo...
- JAAS - The Java Authentication and Authorization Service (JAAS) is a set of ...
- Java Authentication and Authorization Service
- Java Authentication and Authorization Service (...
- key value pair - A key-value pair (KVP) is a set of two linked dat...
- key-value pair - A key-value pair (KVP) is a set of two linked dat...
- key-value pair (KVP) - A key-value pair (KVP) is a set of tw...
- keystroke dynamics - Keystroke dynamics are the patterns of rh...
- KVP - A key-value pair (KVP) is a set of two linked data items: a key, which ...
- LEAP - LEAP (Lightweight Extensible Authentication Protocol) is a Cisco-prop...
- LEAP (Lightweight Extensible Authentication Pro...
- Lightweight Extensible Authentication Protocol
- MAC - A message authentication code (MAC) is a cryptographic checksum on data...