Access time

Results: 2452



#Item
91Cryptography / Public-key cryptography / Key management / Public key infrastructure / Computer access control / E-commerce / One-time password / Certificate authority / Internet Explorer / Public key certificate / Password / Security and safety features new to Windows Vista

FAQs: Digital Certificate Service    

Add to Reading List

Source URL: myexostar.com

Language: English - Date: 2016-06-17 15:09:11
92Computing / Computer architecture / Computer networks / Supercomputers / Software / Remote direct memory access / InfiniBand / IWARP / Latency / PCI Express / Low latency / Linux kernel

It’s Time for Low Latency Steve Rumble, Diego Ongaro, Ryan Stutsman, Mendel Rosenblum, John Ousterhout Stanford University

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2011-05-10 12:45:31
93Cryptography / Security / Engineering / Notary / Public-key cryptography / Computer access control / Access control / Authentication / Packaging / Global Positioning System / Reliability engineering / Satellite navigation

A Secure Civil GNSS: Satellite signal authentication and location & time verification using hidden signatures David De Lorenzo, Sherman Lo, Per Enge October 21, 2009

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2009-10-27 13:42:56
94Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
95Computer access control / Access control / Computer security / Password / Security / Login / Identity management / Self-service password reset / Password fatigue

Investor 360°®: Lo g g in g In to Yo u r Ac c o u nt First-time user Prior to logging in to Investor360°,® obtain your login ID and “one-time” password from your advisor. Please note: Should you have any difficu

Add to Reading List

Source URL: easysite.commonwealth.com

Language: English - Date: 2014-12-22 13:34:57
96Computing / Media access control / Network architecture / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Carrier sense multiple access with collision detection / Data / Throughput / Physical layer / Transmission time / Carrier sense multiple access / Hidden node problem

Communication Networks of Visible Light Emitting Diodes with Intra-Frame Bidirectional Transmission Qing Wang Domenico Giustiniano

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:56:48
97Computing / Supercomputers / Computer networks / Parallel computing / Ethernet / Computer memory / IWARP / Remote direct memory access / Apache Hadoop / Chelsio Communications / WARP / InfiniBand

Accelerating Hadoop with iWARP RDMA Execution-Time Benchmark Results for Big Data Offload Executive Summary Apache Hadoop is a framework that allows for the scalable distributed processing of large data sets across clust

Add to Reading List

Source URL: www.chelsio.com

Language: English - Date: 2015-04-01 04:36:38
98Computer architecture / Software / System software / Kernel / Linux kernel / Operating system / Mandatory access control / Real-time operating systems

High Robustness Cross Domain Solutions Tiger Team John Mildner Jennifer Guild

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
99Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
100Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
UPDATE