Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
The government has revealed plans for a national proof-of-identity scheme that privacy campaigners say has echoes of the ID card project that was scrapped less than six months ago. The identity ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
Nico Popp can see the day when proving who you are on the faceless Internet will be as easy as using a picture I.D. in the real world. Popp is the point man for a new authentication program launched ...
From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other ...
Schools should implement an open source authentication system to give parents and pupils secure access to online content, says a government organisation. Becta, the UK government's education IT ...
Healthcare data breaches are not only costly but potentially life-threatening. Altered or corrupted medical data can lead to incorrect diagnoses, delayed treatment, or inappropriate medical ...
Leading ISP AOL today unveiled a new log-in scheme that will offer its subscribers additional security and protection against password theft and phishing scams. The optional service uses a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results