Authentication is the method a computer uses to ensure that you are who you say you are.
Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.
Sites which are submitted within this category should relate specifically to computer authentication. This can include standards for authentication, software and hardware tools and systems for authentication.
Items relating specifically to authentication using biometrics should be submitted directly to the biometric section (Computers:Security:Biometrics).
Sites relating to other authentication (like home or office security systems) and sites relating to copy-protection and copy-identification schemes (like digital watermarking) are not suitable for this category and won''t be listed.
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography.
Is a process to authenticate users on which requires the presentation of two or more authentication factors. For example, a user introduces a password in a system, the system sends a code, or calls to the user cell phone, the user finally authenticates by introducing the code received.
Reduces drastically the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim's password would no longer be enough to give access -- but may be vulnerable to other attacks.
This category concerns computer authentication systems that are based on single-use password schemes. These can include token-based solutions (like cryptocard) or pure-software solutions (like S/Key).
Items submitted to this category should be related to one-time passwords. Like all categories within Computers/Security/Authentication only computer authentication is relevant here.
Systems that allow access to multiple network resources with a single login.
Sites/products which simply replace an operating system''s login mechanism with a new one are not appropriate to this category, although they may be relevant elsewhere in Computers:Security:Authentication.
This site should be reserved for systems which truly authenticate a user to multiple resources simultaneously.