Access Authentication

Results: 2034



#Item
191Cloud computing / Computer security / Computer access control / Computer network security / Virtual private cloud / Cloud computing security / Authentication / Internet security / Privileged identity management

denial-of-service spoofing application delivery controller (ADC)

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:54
192Computer access control / Cryptography / Cybercrime / Password / Security / Computer security / Multi-factor authentication / Authentication / Outline of computer security / Password manager

December 10, 2015 To: Campus Community Fr: Matthew Hall, Associate Vice Chancellor for Information Technology & Chief Information Officer

Add to Reading List

Source URL: cio.ucsb.edu

Language: English - Date: 2015-12-10 11:26:51
193Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
194Computer access control / Identity management / Federated identity / Security / Computer security / Single sign-on / Authentication / Password / Information security / Privacy / Health Insurance Portability and Accountability Act / Electronic authentication

Privacy Implications for Single Sign-on Authentication In a Hospital Environment Rosa R. Heckle Wayne G. Lutters

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
195Computer network security / Computer access control / ESET / Multi-factor authentication / Authentication / OpenVPN / Virtual private network / RADIUS / Password / Internet Authentication Service / Electronic authentication

logotype - ESET Secure Authentication

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-07-29 05:51:23
196Certificate authorities / Computer access control / IdenTrust / Authentication / ING Group / Bank / EBAM

IdenTrustâ„¢ Electronic Account Management Streamlining Processes & Reducing Costs for Global Corporations Account Opening and Maintenance Made Easy

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:45
197Payment systems / E-commerce / Online banking / Computer access control / Cheque / Security token / Transaction authentication number / Internet fraud / Alternative payments / Giropay

Reference Guide – Business Online Banking Welcome to safer internet banking As online fraud becomes increasingly sophisticated our security measures need to advance to combat these crimes.

Add to Reading List

Source URL: www.co-operativebank.co.uk

Language: English - Date: 2014-07-01 05:27:35
198Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
199Text messaging / Computer access control / Social networking services / Short Message Service / Authentication / Password / Google Search / Facebook / Internet privacy

Evaluating the Effectiveness of Using Hints for Autobiographical Authentication: A Field Study Yusuf Albayram Mohammad Maifi Hasan Khan

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:57
200Computer access control / Password / Security token / Phishing / Authentication / Challengeresponse authentication / Self-service password reset / Multi-factor authentication

Educated Guess on Graphical Authentication Schemes: Vulnerabilities and Countermeasures Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:07:47
UPDATE