Access key

Results: 1959



#Item
81Internet marketing / World Wide Web / Conversion marketing / Form / ZoomInfo / Software / Computing

Data Sheet maximize your conversion rates with formcomplete Access to detailed contact and business information is the key to achieving the best

Add to Reading List

Source URL: www.zoominfo.com

Language: English - Date: 2015-12-16 16:27:47
82Virtual reality / Digital media / Technology / Computing / Cultural globalization / Internet / New media / Telegraphy / National Science Foundation Network / Virtual community / Information literacy

  Some of Greg’s Prairienet motivations:   Access is key. This was a major inequity: computers, modems, phone lines, training, and basic knowledge of what’s out there   Belief in self-empowerment thro

Add to Reading List

Source URL: petascale.org

Language: English - Date: 2010-04-16 10:31:57
83Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
84Cryptography / Computer access control / Computer security / Password / Security / Draw a Secret / Crypt / Key / Password strength / OTPW

Modeling user choice in the PassPoints graphical password scheme Ahmet Emir Dirik Nasir Memon

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-01 10:05:10
85Cryptography / Public key infrastructure / Public-key cryptography / Transport Layer Security / Key management / Computer access control / SOA Security / Security Assertion Markup Language / Revocation list / Online Certificate Status Protocol / WS-Security / Certificate authority

trust claims tokens XML-Encryption

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:27
86Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Language: English
87Civil engineering / Construction / Real estate / Geometry / Surveying / Geodesy / Optical devices / Total station / Tunnel / Spiral / Parabola

TECHSHEET Trimble Access Software: Tunnels Key Features Streamlined workflow

Add to Reading List

Source URL: trl.trimble.com

Language: English
88Cryptography / Public-key cryptography / Identity-based cryptography / Attribute-based encryption / Cloud computing security / Encryption / ID-based encryption / Cipher / Identity-based conditional proxy re-encryption / Encrypting File System

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 03:06:48
89Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
90Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2011-02-20 12:09:41
UPDATE