The Full Wiki

More info on Authentication methods

Top authentication methods (Trending topics)

Advertisements
  

The following are the current most viewed articles on Wikipedia within Wikipedia's Authentication methods category. Think of it as a What's Hot list for Authentication methods. More info »

This is a beta release and so the figures may be a day or two out of date. We'd love to get your thoughts.

Rank Topic Wikipedia views
1 HTTP cookie 8,992 Sparkline of topic views for 2 weeks
2 Rootkit 5,186 Sparkline of topic views for 2 weeks
3 Subscriber Identity Module 3,508 Sparkline of topic views for 2 weeks
4 RADIUS 2,297 Sparkline of topic views for 2 weeks
5 Identity document 2,228 Sparkline of topic views for 2 weeks
6 Kerberos (protocol) 2,110 Sparkline of topic views for 2 weeks
7 Authentication 1,992 Sparkline of topic views for 2 weeks
8 Caller ID 1,653 Sparkline of topic views for 2 weeks
9 Signature 1,545 Sparkline of topic views for 2 weeks
10 Biometric passport 1,386 Sparkline of topic views for 2 weeks
11 Shibboleth 1,360 Sparkline of topic views for 2 weeks
12 Basic access authentication 1,347 Sparkline of topic views for 2 weeks
13 Login 1,212 Sparkline of topic views for 2 weeks
14 IEEE 802.1X 1,188 Sparkline of topic views for 2 weeks
15 NTLM 1,083 Sparkline of topic views for 2 weeks
16 Security Assertion Markup Language 1,045 Sparkline of topic views for 2 weeks
17 Digital watermarking 1,039 Sparkline of topic views for 2 weeks
18 Seal (emblem) 1,008 Sparkline of topic views for 2 weeks
19 Extensible Authentication Protocol 1,003 Sparkline of topic views for 2 weeks
20 Automatic number plate recognition 977 Sparkline of topic views for 2 weeks
21 Security token 972 Sparkline of topic views for 2 weeks
22 Two-factor authentication 836 Sparkline of topic views for 2 weeks
23 Identity management 704 Sparkline of topic views for 2 weeks
24 Tripcode 690 Sparkline of topic views for 2 weeks
25 Copy protection 618 Sparkline of topic views for 2 weeks
26 Fingerprint recognition 593 Sparkline of topic views for 2 weeks
27 Authorization 542 Sparkline of topic views for 2 weeks
28 One-time password 508 Sparkline of topic views for 2 weeks
29 Local Security Authority Subsystem Service 485 Sparkline of topic views for 2 weeks
30 Diameter (protocol) 455 Sparkline of topic views for 2 weeks
31 Challenge-handshake authentication protocol 417 Sparkline of topic views for 2 weeks
32 Captive portal 400 Sparkline of topic views for 2 weeks
33 Real Time Gross Settlement 393 Sparkline of topic views for 2 weeks
34 Seal (East Asia) 378 Sparkline of topic views for 2 weeks
35 Integrated Windows Authentication 357 Sparkline of topic views for 2 weeks
36 TACACS 349 Sparkline of topic views for 2 weeks
37 Counterfeit consumer goods 335 Sparkline of topic views for 2 weeks
38 DNA barcoding 302 Sparkline of topic views for 2 weeks
39 Simple Authentication and Security Layer 276 Sparkline of topic views for 2 weeks
40 MyKad 272 Sparkline of topic views for 2 weeks
41 TACACS+ 265 Sparkline of topic views for 2 weeks
42 Central Authentication Service 243 Sparkline of topic views for 2 weeks
43 Java Authentication and Authorization Service 233 Sparkline of topic views for 2 weeks
44 SPNEGO 232 Sparkline of topic views for 2 weeks
45 Dialed Number Identification Service 212 Sparkline of topic views for 2 weeks
46 Mutual authentication 181 Sparkline of topic views for 2 weeks
47 MS-CHAP 166 Sparkline of topic views for 2 weeks
48 Network access server 152 Sparkline of topic views for 2 weeks
49 Molecular marker 146 Sparkline of topic views for 2 weeks
50 Anonymous call rejection 138 Sparkline of topic views for 2 weeks
51 Passwd (file) 134 Sparkline of topic views for 2 weeks
52 LAN Manager 128 Sparkline of topic views for 2 weeks
53 NTLMSSP 121 Sparkline of topic views for 2 weeks
54 Needham-Schroeder protocol 113 Sparkline of topic views for 2 weeks
55 Transaction authentication number 110 Sparkline of topic views for 2 weeks
56 CRAM-MD5 110 Sparkline of topic views for 2 weeks
57 Key distribution center 109 Sparkline of topic views for 2 weeks
58 Authentication protocol 105 Sparkline of topic views for 2 weeks
59 Security printing 100 Sparkline of topic views for 2 weeks
60 IBM Lightweight Third-Party Authentication 99 Sparkline of topic views for 2 weeks
61 Spring Security 98 Sparkline of topic views for 2 weeks
62 ChilliSpot 96 Sparkline of topic views for 2 weeks
63 Access code 92 Sparkline of topic views for 2 weeks
64 Trusted timestamping 89 Sparkline of topic views for 2 weeks
65 Audio watermark detection 88 Sparkline of topic views for 2 weeks
66 Digipass 87 Sparkline of topic views for 2 weeks
67 Multi-factor authentication 82 Sparkline of topic views for 2 weeks
68 Diameter Credit-Control Application 73 Sparkline of topic views for 2 weeks
69 HOTP 70 Sparkline of topic views for 2 weeks
70 Strong authentication 67 Sparkline of topic views for 2 weeks
71 Initiative For Open Authentication 65 Sparkline of topic views for 2 weeks
72 Apache Shiro 63 Sparkline of topic views for 2 weeks
73 100 point check 61 Sparkline of topic views for 2 weeks
74 Software token 56 Sparkline of topic views for 2 weeks
75 CrypTool 56 Sparkline of topic views for 2 weeks
76 Comparison of privilege authorization features 56 Sparkline of topic views for 2 weeks
77 Pre-boot authentication 56 Sparkline of topic views for 2 weeks
78 Internet Authentication Service 53 Sparkline of topic views for 2 weeks
79 Countersign (legal) 53 Sparkline of topic views for 2 weeks
80 Account aggregation 52 Sparkline of topic views for 2 weeks
81 Kaō 52 Sparkline of topic views for 2 weeks
82 PassWindow 52 Sparkline of topic views for 2 weeks
83 Secure attention key 50 Sparkline of topic views for 2 weeks
84 Security question 43 Sparkline of topic views for 2 weeks
85 Manu propria 42 Sparkline of topic views for 2 weeks
86 Ticket Granting Ticket 42 Sparkline of topic views for 2 weeks
87 Time-based One-time Password Algorithm 42 Sparkline of topic views for 2 weeks
88 Authorization certificate 41 Sparkline of topic views for 2 weeks
89 Form-based authentication 41 Sparkline of topic views for 2 weeks
90 HTTP+HTML form-based authentication 39 Sparkline of topic views for 2 weeks
91 Watermark (data file) 37 Sparkline of topic views for 2 weeks
92 Security hologram 37 Sparkline of topic views for 2 weeks
93 SiteKey 35 Sparkline of topic views for 2 weeks
94 Code wheel 35 Sparkline of topic views for 2 weeks
95 Zero-knowledge password proof 34 Sparkline of topic views for 2 weeks
96 Station-to-Station protocol 33 Sparkline of topic views for 2 weeks
97 KYPS 33 Sparkline of topic views for 2 weeks
98 Copy attack 32 Sparkline of topic views for 2 weeks
99 PASS 28 Sparkline of topic views for 2 weeks
100 Enigform 28 Sparkline of topic views for 2 weeks
101 Wide Mouth Frog protocol 27 Sparkline of topic views for 2 weeks
102 Light-Weight Identity 27 Sparkline of topic views for 2 weeks
103 Transaction verification 27 Sparkline of topic views for 2 weeks
104 Passwd (database) 24 Sparkline of topic views for 2 weeks
105 Closed-loop authentication 23 Sparkline of topic views for 2 weeks
106 BSD Authentication 22 Sparkline of topic views for 2 weeks
107 Expertization 21 Sparkline of topic views for 2 weeks
108 Protocol for Carrying Authentication for Network Access 21 Sparkline of topic views for 2 weeks
109 Vidoop 21 Sparkline of topic views for 2 weeks
110 Radiator RADIUS server 20 Sparkline of topic views for 2 weeks
111 Distributed Access Control System (DACS) 19 Sparkline of topic views for 2 weeks
112 Otway-Rees protocol 18 Sparkline of topic views for 2 weeks
113 Maker-checker 18 Sparkline of topic views for 2 weeks
114 MicroID 17 Sparkline of topic views for 2 weeks
115 Budapest Declaration on Machine Readable Travel Documents 17 Sparkline of topic views for 2 weeks
116 Ticket punch 16 Sparkline of topic views for 2 weeks
117 AirMarshal 16 Sparkline of topic views for 2 weeks
118 Group (database) 16 Sparkline of topic views for 2 weeks
119 Elm City Resident Card 16 Sparkline of topic views for 2 weeks
120 Location-based authentication 14 Sparkline of topic views for 2 weeks
121 Time-based authentication 13 Sparkline of topic views for 2 weeks
122 EAuthentication 12 Sparkline of topic views for 2 weeks
123 Voms 12 Sparkline of topic views for 2 weeks
124 Wilmagate 12 Sparkline of topic views for 2 weeks
125 Crowd (software) 12 Sparkline of topic views for 2 weeks
126 Transient-key cryptography 12 Sparkline of topic views for 2 weeks
127 Extended access control 12 Sparkline of topic views for 2 weeks
128 IrFM 11 Sparkline of topic views for 2 weeks
129 Clubscan 11 Sparkline of topic views for 2 weeks
130 Atomic Authorization 10 Sparkline of topic views for 2 weeks
131 Neuman-Stubblebine protocol 10 Sparkline of topic views for 2 weeks
132 DataLock Technology 9 Sparkline of topic views for 2 weeks
133 Identity Assertion Provider 8 Sparkline of topic views for 2 weeks
134 Cryptographic log on 7 Sparkline of topic views for 2 weeks
135 Transaction authentication 7 Sparkline of topic views for 2 weeks
136 Municipal identification card 7 Sparkline of topic views for 2 weeks
137 BCODE 6 Sparkline of topic views for 2 weeks
138 Yahalom (protocol) 6 Sparkline of topic views for 2 weeks
139 Security store less than 5 views
140 One time authorization code less than 5 views
141 Shibboleths less than 5 views
142 Authentication protocols less than 5 views
143 Mobilegov less than 5 views
144 Guksae less than 5 views

Subcategories

Parent categories


Encyclopedia

From Wikipedia, the free encyclopedia

Subcategories

This category has the following 9 subcategories, out of 9 total.

B

E

I

M

P

S

W

Pages in category "Authentication methods"

The following 139 pages are in this category, out of 139 total. This list may not reflect recent changes (learn more).

*

1

A

B

C

D

E

E cont.

F

G

H

I

J

K

L

M

N

O

P

P cont.

R

S

T

V

W

Y

Z

Media in category "Authentication methods"

The following 5 files are in this category, out of 5 total.


Advertisements






Got something to say? Make a comment.
Your name
Your email address
Message