| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
| Authentication and Authorization. From basic access control to federated identity |
2011 |
454 |
11 |
Современные механизмы авторизации и аутентификации |
| Authentication and Authorization. |
February 2012 |
714 |
11 |
|
| The Future of Authentication for Online Services |
2011 |
302 |
11 |
|
| Essential Guide to Identity and Access Management Managing proper access to applications
and sensitive data becomes even more important in a recession. |
2009 |
8046 |
41 |
|
| Protecting against modern password cracking. Are passwords still an adequate form of authentication? |
2013 |
319 |
8 |
by Yiannis Chrysanthou и Allan Tomlinson |
| Privileged Identity Management Controlling access without compromising convenience |
2014 |
607 |
7 |
Identity and Access |
| Authentication and Authorization From basic access control to federated identity |
Feb. 2012 |
714 |
11 |
|
| Facelock Technology: The Future of Passwords |
July 22 2014 |
122 |
2 |
IDG Connect |
| Has the time come to kill the password? |
07 Apr 2015 |
161 |
5 |
Scott Nesbitt Feed |
| Login system supplies fake passwords to hackers |
May 18, 2015 |
346 |
2 |
Jeremy Kirk |
| Human Computable Passwords |
October 6, 2014 |
921 |
43 |
Jeremiah Blocki, Manuel Blum, Anupam Datta, Santosh Vempala |
| Biometric data becomes the encryption key in Fujitsu system |
October 28, 2015 |
346 |
2 |
Martyn Williams |
| 1Password: The smart person's guide |
October 28, 2016 |
368 |
3 |
Brandon Vigliarolo, TechRepublic |
| Russian users far better at passwords than U.S. users |
Nov 7, 2016 |
166 |
3 |
Darlene Storm, Computerworld |
| Hacker can backdoor your computer and router in 30 seconds with $5 PoisonTap device |
Nov 16, 2016 |
316 |
3 |
Darlene Storm, Computerworld |
| The end of passwords? Not in the near future |
December 19, 2016 |
415 |
4 |
Jack Wallen, TechRepublic |
| Reset a lost root password in under 5 minutes |
30 Apr 2018 |
116 |
3 |
Curt Warfield (Red Hat) |
| |
|
|
|
|