Home > Computers > Security > Authentication
Authentication is the method a computer uses to ensure that you are who you say you are. Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.
http://seclab.cs.ucdavis.edu/papers/mb91c.ps
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
http://www.finallysoftware.com/
Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
http://www.authenticationtutorial.com/
Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots.
http://www.iisprotect.com/
Functions with Internet Information Server to secure web sites. Includes live demo.
http://www.intertrust.com/
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
http://www.projectliberty.org/
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
http://mtechit.com/
ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details.
http://www.nma.com/
ZSentry two-factor authentication solution. Product information, white papers and contact details.
http://www.cosbatch.com/
Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs.
http://seclab.cs.ucdavis.edu/papers/pdfs/mb-91.pdf
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques.
http://srp.stanford.edu/
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
http://www.opengroup.org/idm/
Consortium promoting open standards-based identity management. Includes downloadable white papers and information on current projects.
http://www.unisys.com/
Makers of several related products. Includes rationale as well as usage information.
http://www.vasco.com/
Makers of both software and hardware systems. Demos, case studies and product information.
Home > Computers > Security > Authentication
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us