authenticate

  • 101Kerberos (protocol) — Kerberos is a computer network authentication protocol, which allows individuals communicating over a non secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts… …

    Wikipedia

  • 102Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… …

    Wikipedia

  • 103Coat of arms — redirects here. For the album by Sabaton, see Coat of Arms (album). Shield Field Supporter Supporter …

    Wikipedia

  • 104Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means …

    Wikipedia

  • 105Civil law notary — 16th century painting of a civil law notary, by Flemish painter Quentin Massys Civil law notaries, or Latin notaries, are lawyers of noncontentious private civil law who draft, take, and record legal instruments for private parties, provide legal …

    Wikipedia

  • 106Mobile payment — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softwar …

    Wikipedia

  • 107Superuser — For the enterprise system role, see Power user. On many computer operating systems, the superuser is a special user account used for system administration. Depending on the operating system, the actual name of this account might be: root,… …

    Wikipedia

  • 108Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… …

    Wikipedia

  • 109Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …

    Wikipedia

  • 110Network switching subsystem — (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and… …

    Wikipedia