Access token

Results: 765



#Item
91Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: ioactive.com

Language: English
92Multi-factor authentication / Authentication / Password / Security token / Information security / Two-factor authentication / Password manager / Security / Access control / Computer security

Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online – December 10, 2014 Mike Grady, Scalable Privacy Project

Add to Reading List

Source URL: incommonfederation.org

Language: English - Date: 2014-12-10 13:36:21
93Payment systems / Electronic commerce / Security token / Two-factor authentication / Software token / Embedded systems / Authentication / Online banking / Debit card / Security / Computer security / Access control

Application for DBBL Two Factor Authentication (2FA) Registration Date: D D M M

Add to Reading List

Source URL: ecom1.dutchbanglabank.com

Language: English - Date: 2014-03-24 01:38:00
94Access control / Identity management / Password / Salt / Passphrase / John the Ripper / Crypt / Security token / OTPW / Security / Computer security / Cryptography

The Tangled Web of Password Reuse Anupam Das∗ , Joseph Bonneau† , Matthew Caesar∗ , Nikita Borisov∗ and XiaoFeng Wang‡ ∗ University of Illinois at Urbana-Champaign {das17, caesar, nikita}@illinois.edu

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-12-13 12:04:32
95Computer network security / Password / Authentication / Biometrics / Two-factor authentication / Security token / Security / Computer security / Access control

INDISTINGUISHABLE FROM MAGIC Is Secure and Usable Smartphone Authentication Asking Too Much?

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2015-05-18 18:23:42
96Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
97Two-factor authentication / Multi-factor authentication / Password / Biometrics / Authentication / Identity management / Mobile business intelligence / Security token / Security / Access control / Computer security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
98Access token / Tap / Adobe Systems / Technology / Agriculture / Computing / Token coin / Tokens / Tap dance

Freading eBooks on iPad, iPhone, and iPod Touch KMD 6/14

Add to Reading List

Source URL: www.poudrelibraries.org

Language: English - Date: 2014-06-20 11:41:31
99National security / Personal life / Data security / Personally identifiable information / Information security / Password / Access token / Malware / Ring / Security / Computer security / Crime prevention

All employees have the responsibility to:

Add to Reading List

Source URL: icbs.nwcg.gov

Language: English - Date: 2008-06-04 13:20:46
100Computer security / Inter-process communication / Access control / Security descriptor / Local Procedure Call / Access token / Object Manager / Security Identifier / Windows Registry / Microsoft Windows / Computing / Windows NT architecture

Modeling the trust boundaries created by securable objects Matt Miller Leviathan Security Group Abstract One of the most critical steps of any security review involves identifying the trust boundaries that an application

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2008-07-15 18:26:11
UPDATE