Access Authentication

Results: 2034



#Item
861Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / IEEE 802.11i-2004 / Wireless security / Extensible Authentication Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols

Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) Paul Arana INFS 612 – Fall 2006 Abstract With the increase in use of Wireless Networks, the

Add to Reading List

Source URL: cs.gmu.edu

Language: English - Date: 2006-11-29 23:32:26
862Federated identity / Identity / Access control / Single sign-on / Two-factor authentication / Authentication / Identity theft / Federated identity management / Password / Security / Computer security / Identity management

IDENTITY MANAGEMENT February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:46
863Software / Computing / Windows XP / Windows Vista / Windows / Aloaha / Two-factor authentication / Microsoft Windows / Windows NT / Computer architecture

TRADE/APEA ANZ TRANSACTIVE CUSTOMER SYSTEM REQUIREMENTS MINIMUM SPECIFICATIONS Below is the list of specifications required to access ANZ Transactive.

Add to Reading List

Source URL: www.anz.com

Language: English - Date: 2014-12-04 04:42:29
864Federated identity / Password / Identity theft / Electronic authentication / One-time password / Authentication / Transaction authentication number / Two-factor authentication / Credit card fraud / Security / Computer security / Access control

Electronic Authentication Animations – Common Threats (Identity Theft) (Script) Introduction Electronic identity is widely used for electronic transactions (e-transactions). While electronic identity helps to build tru

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
865Federated identity / Password / Identity theft / Electronic authentication / One-time password / Authentication / Transaction authentication number / Two-factor authentication / Credit card fraud / Security / Computer security / Access control

Electronic Authentication Animations – Common Threats (Identity Theft) (Script) Introduction Electronic identity is widely used for electronic transactions (e-transactions). While electronic identity helps to build tru

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
866Computer network security / Authentication / Notary / Packaging / Multi-factor authentication / Password / One-time password / Transaction authentication number / Two-factor authentication / Security / Computer security / Access control

PROTECT - Multi-factor authentication

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-07-08 00:42:18
867Information security / Authentication / Identity document / Information Technology Infrastructure Library / EGovernment in Europe / Liberty Alliance / Security / Identity / Identity management

Microsoft Word - Introduction - Identity and Access Management Toolkit.DOC

Add to Reading List

Source URL: www.egovernment.tas.gov.au

Language: English - Date: 2010-01-18 18:59:14
868Computing / Acronis Secure Zone / Acronis / Two-factor authentication / Acronis True Image

Introducing Acronis Access: The First Solution to Comprehensively Address Educational Institutions’ Needs for Mobile File Access, Synching and Sharing Staff and Students can now Conveniently Work and Collaborate From A

Add to Reading List

Source URL: edutech.net.au

Language: English - Date: 2014-06-20 02:12:56
869Mobile computers / Mobile document access / Mobile phone / Two-factor authentication / Mobile business intelligence / Mobile file management / Technology / Computing / Information technology management

Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for the corporate env

Add to Reading List

Source URL: www.easishare.com

Language: English - Date: 2014-10-26 11:59:52
870Authentication / Notary / Packaging / Electronic authentication / Password / Security token / One-time password / Transaction authentication number / Multi-factor authentication / Security / Computer security / Access control

Electronic Authentication Animations– Verify Identity (Script) Introduction Electronic transaction (e-transaction) means convenience as well as efficiency to many people. To ensure e-transaction is conducted in a reli

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-06 21:28:20
UPDATE