Strong Authentication Strong Authentication is a commonly-used term that is largely without a standardized definition. It is often used synonymously with two-factor authentication or multifactor authentication However,…
Security Printing This article talks about Security Printing, which is printing of items such as banknotes, cheques, passports, tamper-evident labels, product authentication, stock certificates, postage stamps and…
Secure Shell Secure Shell is widely used by network administrators for managing systems and applications remotely, allowing them to log in to another computer over a network,…
Public key Cryptography Public key Cryptography is uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together…
Kerberos Protocol Kerberos Protocol is designed to enable two parties to exchange private information across an otherwise open network. It works on the basis of ‘tickets’ to…
Geolocation Geolocation provides the location of a device but is generally used in a variety of applications to help locate human users. It works through a…
Fingerprint Verification Competition Fingerprint Verification Competition is the world’s largest competition for fingerprint verification algorithms. It applies algorithms over four databases of fingerprint images from multiple sources and…
Electronic Authentication Electronic Authentication provides a level of assurance as to whether someone or something is who or what it claims to be in a digital environment. It…
About Biometrics Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. It is used in computer science as a form…
Two Factor Authentication Two Factor Authentication is a security process, which provides users two means of identification from separate categories of credentials; one is typically a physical token,…
Online Identity Management Online Identity Management plays a key role in fighting identity fraud, is essential to establishing the trust necessary to facilitate electronic transactions of all types,…
Privileged Identity Management Privileged Identity Management is frequently used as an information security and governance tool to help companies in meeting compliance regulations and to prevent internal data…