Access control

Results: 10445



#Item
441Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
442Computing / Computer network security / Computer security / Software / Computer access control / Directory services / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Comparison of mail servers

RadiusNT & RadiusX The Ultimate RADIUS Servers For Windows NT, Linux, Solaris & Cobalt Appliances Version 4.0

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-11-25 04:29:55
443Computing / Software / Computer access control / Prevention / Humancomputer interaction / World Wide Web / User / Hyperlink / Login / Password

Professional Development by intelitek User Guide November 2015 Catalog # Rev C

Add to Reading List

Source URL: inspired.intelitek.com

Language: English - Date: 2016-06-14 14:22:26
444Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
445Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
446Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
447Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2011-02-20 12:09:41
448Computing / Computer security / Computer access control / Computer network security / Wireless networking / Extensible Authentication Protocol / IEEE 802.1X / RADIUS / Authentication / Mutual authentication / Supplicant / Single sign-on

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
449Computer access control / Access control / Computer security / Password / Security / Login / Identity management / Self-service password reset / Password fatigue

mySMHCchart Frequently Asked Questions What is mySMHCchart? Our patient portal, mySMHCchart, was designed to help SMHC patients simplify their lives. This secure and confidential web-based patient portal allows you to:

Add to Reading List

Source URL: www.smhc.org

Language: English - Date: 2014-06-27 15:23:58
450Internet privacy / Computer access control / Hypertext Transfer Protocol / World Wide Web / Computing / Computer security / Web analytics / HTTP cookie / Information privacy / Google Analytics / Opt-out / Targeted advertising

COOKIE POLICY In accordance with article 13 of Italian Legislative Decree no, “Regulation for the protection of Personal Data” (hereafter simply “Regulation”), this information segment explains what cooki

Add to Reading List

Source URL: www.italmatch.it

Language: English - Date: 2015-08-03 05:58:18
UPDATE