Access Authentication

Results: 2034



#Item
71Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
72Watermarking / Cryptography / Access control / Authentication / Digital watermarking / Watermark / Microsoft Word / Search engine indexing / Document / Fingerprint / Audio watermark

Watermarking of Electronic Text Documents Mohan S Kankanhalli & K.F Hau School of Computing National University of Singapore, SingaporeEmail:

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-04-25 01:40:31
73Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
74Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
75Computer access control / Computer security / Cryptography / Security / Authentication / Password / Multi-factor authentication / Electronic authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
76Computer access control / Usability / Prevention / Computer security / Security / Password / Authentication / Usability of web authentication systems

Microsoft Word - Document1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:40
77Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Password synchronization / Password policy

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
78Cryptography / Computer access control / Signature / Computer law / E-commerce / Cryptography standards / Authentication / Biometrics / Electronic signature / RSA SecurID / Public key certificate / Qualified electronic signature

Confirmation pursuant to § 18 para. 5 SigG

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2016-06-27 03:25:11
79Computer security / Security / Computer access control / Open standards / Internet of Things / Ambient intelligence / Authentication / Open Connectivity Foundation / Identity management

Identity and Access Management for Smart Home Devices

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-06-03 07:49:14
80Computer access control / Identity management / Computer security / Federated identity / Identity / Authentication / Notary / Packaging / Digital identity / Identity assurance

Digital ID final option appraisal

Add to Reading List

Source URL: blog.gov.je

Language: English - Date: 2016-07-07 06:54:47
UPDATE