• The graphical identification and authentication (GINA) is a component of Windows NT 3.51, Windows NT 4.0, Windows 2000, Windows XP and Windows Server 2003...
    7 KB (790 words) - 10:48, 26 September 2023
  • conjunction with the United States Department of Defense Graphical identification and authentication, dynamic-link library (DLL) G.I.N.A, album by Amerado...
    1 KB (209 words) - 02:21, 2 December 2024
  • Thumbnail for Password
    Password (category Password authentication)
    identifiers). Requiring more than one authentication system, such as two-factor authentication (something a user has and something the user knows). Using encrypted...
    79 KB (9,039 words) - 00:46, 1 May 2025
  • Thumbnail for One-time password
    One-time password (category Password authentication)
    traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password...
    26 KB (3,542 words) - 04:05, 7 February 2025
  • item authentication applications: As a means of providing a product authentication service using the Internet of Things. For securing identification documents...
    16 KB (1,729 words) - 05:23, 11 March 2025
  • Thumbnail for Fingerprint
    applications. Fingerprint scanners could be used for login authentication and the identification of computer users. However, some less sophisticated sensors...
    112 KB (12,076 words) - 22:05, 15 March 2025
  • observation attacks, in which authentication information is obtained by a person who is directly monitoring the authentication sequence, and recording attacks, in...
    16 KB (2,075 words) - 21:16, 28 January 2025
  • from being able to hijack them. Graphical identification and authentication (GINA), used for secure authentication and interactive logon has been replaced...
    45 KB (5,802 words) - 12:27, 25 November 2024
  • Thumbnail for Automatic identification system
    The automatic identification system (AIS) is an automatic tracking system that uses transceivers on ships and is used by vessel traffic services (VTS)...
    90 KB (11,133 words) - 15:14, 14 March 2025
  • Thumbnail for Smudge attack
    A new proposed authentication method called Fractal-Based Authentication Technique (FBAT) uses Sierpinski’s Triangle to authenticate users. This process...
    52 KB (6,842 words) - 09:30, 21 September 2024
  • Thumbnail for Public key infrastructure
    server-side authentication - typically used when authenticating to a web server using a password. The latter is termed client-side authentication - sometimes...
    35 KB (4,119 words) - 04:22, 26 March 2025
  • Thumbnail for Flipper Zero
    Flipper Zero (category Radio-frequency identification)
    and emulation of RFID chips such as those found in identification badges, using the built-in radio cloner to open garage doors, unlocking cars, and functioning...
    27 KB (2,789 words) - 01:17, 30 April 2025
  • Thumbnail for Proxy server
    Intercepting also creates problems for HTTP authentication, especially connection-oriented authentication such as NTLM, as the client browser believes...
    47 KB (5,574 words) - 19:45, 18 April 2025
  • Cognitive password (category Password authentication)
    A cognitive password is a form of knowledge-based authentication that requires a user to answer a question, presumably something they intrinsically know...
    10 KB (1,273 words) - 03:38, 11 February 2025
  • opportunistic encryption and authenticated encryption may be supported, but did not make either server or client authentication mandatory. DNS over HTTPS...
    69 KB (9,811 words) - 15:40, 28 April 2025
  • 286—Intel 80286 processor 2B1Q—2 binary 1 quaternary 2FA—Two-factor authentication 2GL—second-generation programming language 2NF—second normal form 3GL—third-generation...
    92 KB (6,587 words) - 22:31, 24 March 2025
  • integrity and non-repudiation of origin) ISO 9735-6:2002 Part 6: Secure authentication and acknowledgement message (message type – AUTACK) ISO 9735-7:2002 Part...
    67 KB (9,553 words) - 13:02, 8 January 2025
  • Thumbnail for Barcode
    Barcode (category Automatic identification and data capture)
    1960s. Developed by General Telephone and Electronics (GTE) and called KarTrak ACI (Automatic Car Identification), this scheme involved placing colored...
    92 KB (7,816 words) - 11:32, 22 April 2025
  • Thumbnail for Seal (emblem)
    including an embossment on paper, and is also the impression thus made. The original purpose was to authenticate a document, or to prevent interference...
    46 KB (5,743 words) - 04:15, 3 April 2025
  • – Wireless Terminal Authentication supplementary services ISO/IEC 15434:2006 Information technology – Automatic identification and data capture techniques...
    75 KB (10,419 words) - 03:39, 27 April 2024
  • Thumbnail for Fox Broadcasting Company
    Fox Broadcasting Company (category Television channels and stations established in 1986)
    breaks), and versions with "clean" end tags to allow stations to include local airtime and station information through graphical insertion and verbal continuity...
    179 KB (21,133 words) - 00:57, 28 April 2025
  • "combines a subset of the UML (Unified Modeling Language) graphical notation with executable semantics and timing rules." The Executable UML method is the successor...
    14 KB (1,782 words) - 06:16, 14 September 2024
  • Thumbnail for Home Assistant
    Home Assistant (category Free and open-source Android software)
    in custom integrations HACS, Font Awesome and others". Home Assistant. Retrieved 1 April 2021. "Authentication bypass Supervisor API". GitHub. Retrieved...
    33 KB (3,269 words) - 20:18, 27 April 2025
  • Lock screen (category Graphical user interface elements)
    There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs)...
    18 KB (1,914 words) - 12:25, 3 November 2024
  • Thumbnail for Caldera International
    Caldera International (category 2001 mergers and acquisitions)
    included features it developed, such as an easy-to-use, graphical installer and graphical and web-based system administration tools, as well as features...
    75 KB (7,717 words) - 12:33, 6 November 2024
  • using software, they are suitable for scenarios where graphical imagery is not appropriate, and they provide a much higher level of accessibility for...
    38 KB (3,537 words) - 01:41, 25 April 2025
  • Thumbnail for Ancient protein
    databases, identification, contamination and authentication. Researchers have been working on standardising sampling, extraction, data analysis and reporting...
    74 KB (7,980 words) - 15:43, 11 April 2025
  • Stylometry (category Personal identification)
    about the author short of a full identification. Authors may use adversarial stylometry to resist this identification by eliminating their own stylistic...
    59 KB (6,675 words) - 05:08, 5 April 2025
  • identification and authentication: e.g., license plate recognition, fingerprint analysis, face detection/verification, and voice-based authentication...
    35 KB (4,259 words) - 17:23, 25 April 2025
  • Thumbnail for Systems engineering
    safety, and systems engineering. It may involve such sub-specialties as authentication of system users, system targets, and others: people, objects, and processes...
    56 KB (5,733 words) - 23:48, 28 February 2025