Access Authentication

Results: 2034



#Item
481Business / Embedded systems / Security token / Online banking / Transaction authentication number / Automated teller machine / Password / Authentication / Two-factor authentication / Payment systems / Technology / Security

PIN and Pass Code Security To guard against unauthorised electronic transactions, whether via the use of access cards, such as Visa or Redicards and a PIN, or through phone and internet banking services where a Pass Code

Add to Reading List

Source URL: www.qtmb.com.au

Language: English - Date: 2014-12-18 19:45:45
482Access control / Identity management / Computer security / Simple public key infrastructure / PERMIS / Authentication / Filesystem permissions / KB / Public key certificate / Cryptography / Key management / Public-key cryptography

Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-06-02 09:03:03
483Phishing / Social engineering / Email / Computer virus / Technology / Online banking / Transaction authentication number / Password / Malware / Spamming / Computing / Internet

Press Release October 14, 2011 Information-technology Promotion Agency, Japan Computer Virus/Unauthorized Computer Access Incident Report - September 2011 This is the summary of computer virus/unauthorized computer acces

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:50
484Cryptography / Password / Computer network security / One-time password / Salt / Password manager / Password strength / Security / Computer security / Access control

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments Katelin Bailey Linden Vongsathorn

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:56:57
485Access control / Authentication / Notary / Packaging / Password / Security token / Speaker recognition / Fingerprint / Keystroke dynamics / Security / Biometrics / Identification

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:48
486Identity management / XACML / Role-based access control / Authorization / Authentication / OASIS / Directory service / PERMIS / Radiant Logic / Security / Computer security / Access control

World Leading Directory Technology White Paper: Location, Location, Location: Where You Put Your Identity

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 01:02:44
487McAfee / One-time password / Password / Security token / Two-factor authentication / Authentication / Password manager / McAfee VirusScan / Security / Computer security / Access control

Data Sheet McAfee Secures Juniper Networks Features Added security

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:02
488Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
489User interface techniques / Access control / Authentication / Notary / Packaging / Two-factor authentication / Password / Keystroke dynamics / Brain–computer interface / Security / Cryptography / Biometrics

My Thoughts Are Not Your Thoughts Benjamin Johnson Carnegie Mellon University

Add to Reading List

Source URL: appanalysis.org

Language: English - Date: 2014-07-31 17:22:18
490Cloud infrastructure / Two-factor authentication / IBM cloud computing / Rackspace Cloud / Cloud computing / Centralized computing / Computing

Stoneware’s webNetwork enables any organization to create their own private cloud where users can access applications and services from anywhere, using any device.

Add to Reading List

Source URL: www.visiria.nl

Language: English - Date: 2012-04-15 15:11:55
UPDATE