Strong Authentication

Strong Authentication

Strong Authentication is a commonly-used term that is largely without a standardized definition. It is often used synonymously with two-factor authentication or multifactor authentication  However,…
Security Printing

Security Printing

This article talks about Security Printing, which is printing of items such as banknotes, cheques, passports, tamper-evident labels, product authentication, stock certificates, postage stamps and…
Secure Shell

Secure Shell

Secure Shell is widely used by network administrators for managing systems and applications remotely, allowing them to log in to another computer over a network,…
Public key Cryptography

Public key Cryptography

Public key Cryptography is uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together…
Kerberos Protocol

Kerberos Protocol

Kerberos Protocol is designed to enable two parties to exchange private information across an otherwise open network. It works on the basis of ‘tickets’ to…
Geolocation

Geolocation

Geolocation provides the location of a device but is generally used in a variety of applications to help locate human users. It works through a…
Fingerprint Verification Competition

Fingerprint Verification Competition

Fingerprint Verification Competition is the world’s largest competition for fingerprint verification algorithms. It applies algorithms over four databases of fingerprint images from multiple sources and…
Electronic Authentication

Electronic Authentication

Electronic Authentication provides a level of assurance as to whether someone or something is who or what it claims to be in a digital environment. It…
About Biometrics

About Biometrics

Biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. It  is used in computer science as a form…
Two Factor Authentication

Two Factor Authentication

Two Factor Authentication is a security process, which provides users two means of identification from separate categories of credentials; one is typically a physical token,…
Online Identity Management

Online Identity Management

Online Identity Management plays a key role in fighting identity fraud, is essential to establishing the trust necessary to facilitate electronic transactions of all types,…
Privileged Identity Management

Privileged Identity Management

Privileged Identity Management is frequently used as an information security and governance tool to help companies in meeting compliance regulations and to prevent internal data…
Load More