Access control

Results: 10445



#Item
371Prevention / Computer access control / Cryptography / Gesture / Security / Multi-touch / Authentication / Password

User-Generated Free-Form Gestures for Authentication: Security and Memorability Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-18 21:13:10
372Security / Computer security / Computer access control / Access control / Identity management / Perimeter security / PERMIS / Trust management / Authentication / Authorization

The Role of Trust Management in Distributed Systems Security Matt Blaze1 , Joan Feigenbaum1 , John Ioannidis1 , and Angelos D. Keromytis2 1 AT&T Labs - Research

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2001-10-24 10:48:32
373Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
374Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
375Computer access control / Cryptography / Humancomputer interaction / Technical communication / Usability / Authentication / Computer security / Security

SOUPSPersonal Choice and Challenge Questions: A Security and Usability Assessment 16 July 2009

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-16 14:02:05
376Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
377Cryptography / Security / Computer security / Computer access control / Public-key cryptography / Electronic documents / Notary / SAFE-BioPharma Association / Identity management / Digital signature / SAFE / Authentication

VASCO MYDIGIPASS Gains SAFE-BIOPHARMA Full-Service Credential Service Provider Certification OAKBROOK TERRACE, IL and TENAFLY, NJ – August 10, VASCO Data Security International, Inc. (NASDAQ: VDSI), a global le

Add to Reading List

Source URL: www.safe-biopharma.org

Language: English - Date: 2016-08-10 11:17:32
378Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
379World Wide Web / Internet privacy / Marketing / Internet marketing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Web analytics / Google Analytics / Online advertising / Opt-out

Cookie Policy Last update: June 2015 What are cookies? The site hunimed.eu uses cookies. As clarified in FAQs section of “Garante Privacy” in December 2012, available on www.garanteprivacy.it, cookies are defined as

Add to Reading List

Source URL: www.hunimed.eu

Language: English - Date: 2015-08-04 08:04:03
380Algebra / Mathematics / Linear algebra / Matrix theory / Abstract algebra / Eigenvalues and eigenvectors / Singular value decomposition / Markov chain

Performance of Random Medium Access Control An asymptotic approach Charles Bordenave David McDonald

Add to Reading List

Source URL: www.math.univ-toulouse.fr

Language: English - Date: 2008-04-07 07:55:53
UPDATE