Category:Authentication methods
![]() | Computing portal |
Here is a list of articles in the category Authentication methods of the Computing portal that unifies foundations of mathematics and computations using computers.
![]() | Pages in this category should be moved to subcategories where applicable. This category may require frequent maintenance to avoid becoming too large. It should directly contain very few, if any, pages and should mainly contain subcategories. |
Subcategories
This category has the following 4 subcategories, out of 4 total.
B
C
M
P
Pages in category "Authentication methods"
The following 107 pages are in this category, out of 107 total.
A
- Access Control Service (computing)
- Algae DNA barcoding (computing)
- Associated Signature Containers (computing)
- Automatic number-plate recognition (computing)
B
- Biometric passport (computing)
- Biometrics (computing)
C
- Caller ID (computing)
- Challenge–response authentication (computing)
- City identification card (computing)
- Claims-based identity (computing)
- Code wheel (computing)
- Comparison of authentication solutions (computing)
- Copy detection pattern (computing)
- Copy-evident document (computing)
- Counterfeit consumer goods (computing)
- Countersign (legal) (computing)
- Cruise ship ID card (computing)
D
- Decentralized identifiers (computing)
- Dialed Number Identification Service (computing)
- Self-sovereign identity (computing)
- Digital watermarking (computing)
E
- E-commerce identification and identification types (computing)
- EIDAS (computing)
- Electronic signature (computing)
- ESign (India) (computing)
- European identity card (computing)
- Passports of European Union candidate states (computing)
- Expertization (computing)
- Eye vein verification (computing)
F
- Face ID (computing)
- FADO (computing)
- FIDO Alliance (company)
- Fingerprint recognition (computing)
- Fish DNA barcoding (computing)
- FreeOTP (software)
G
- GateKeeper (access control device) (software)
- Geospatial authentication (computing)
- Great Seal (computing)
- Guksae (computing)
H
- Handwritten biometric recognition (computing)
- Hylemetry (computing)
- HYPR Corp (company)
I
- Identification friend or foe (computing)
- Levels of identity security (computing)
- Idex ASA (company)
- IDEX Biometrics (company)
- Implicit authentication (computing)
K
- Kaō (computing)
L
- LinOTP (software)
- List of shibboleths (computing)
- Location-based authentication (computing)
- Login (computing)
M
- Manu propria (computing)
- Microbial DNA barcoding (computing)
- Microprinting (computing)
- Molecular marker (computing)
- Multi-factor authentication (computing)
- MultiOTP (software)
- Mutual authentication (computing)
- Malaysian identity card (computing)
N
- National Health Service Central Register (Scotland) (computing)
- Nitrokey (computing)
P
- PARAFE (computing)
- Passports of the EFTA member states (computing)
- Passwordless authentication (computing)
- Poor man's copyright (computing)
- Pre-shared key (computing)
- PrivacyIDEA (software)
- Proof of Age Standards Scheme (company)
- Protection papers (computing)
- Protocol for Carrying Authentication for Network Access (computing)
Q
- Qualified digital certificate (computing)
- Qualified electronic signature (computing)
- Qualified website authentication certificate (computing)
R
- Reliance authentication (computing)
- Risk-based authentication (computing)
S
- Scottish National Entitlement Card (computing)
- Seal (East Asia) (computing)
- Seal (emblem) (computing)
- Sealing wax (computing)
- Secure signature creation device (computing)
- RSA SecurID (computing)
- Security hologram (computing)
- Security printing (computing)
- Security question (computing)
- Security tape (computing)
- Security token (computing)
- Sequence-related amplified polymorphism (computing)
- Service authentication (computing)
- SF City ID Card (computing)
- Shibboleth (computing)
- Signature (computing)
- Smart card (computing)
- Sproxil (company)
- SQRL (software)
- Strong authentication (computing)
- Strong customer authentication (computing)
T
- Ticket punch (computing)
- Time-based authentication (computing)
- Touch ID (computing)
- Trust service provider (computing)
- Trusted timestamping (computing)
V
- Void pantograph (computing)
W
- Watermark (data file) (computing)
- WebAuthn (computing)
- Woo–Lam (computing)
Y
- YubiKey (company)