Authentication

Results: 7063



#Item
761Computer network security / Wi-Fi / Wireless networking / IEEE 802.11 / Wi-Fi Protected Access / IEEE 802.1X / AirPort / Wireless security / Extensible Authentication Protocol

Connecting to the Rovernet WPA2 Secured Wireless Network with the Mac OS XPanther) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirement

Add to Reading List

Source URL: www.it.mtu.edu

Language: English
762

Subject to Legal Review in English, Spanish and French for Accuracy, Clarity and Consistency Subject to Authentication of English, Spanish and French Versions CHAPTER 16 COMPETITION POLICY

Add to Reading List

Source URL: itsourfuture.org.nz

Language: English
    763Computer security / Identity management / Cryptography / Computer access control / Access control / Authentication / Notary / Packaging / Password / Internet privacy / Privacy Commissioner / Privacy

    State Services Commission

    Add to Reading List

    Source URL: www.realme.govt.nz

    Language: English - Date: 2015-05-13 01:46:13
    764Online banking / Computer access control / Transaction authentication number / Wirecard / International Bank Account Number / Deposit account / Bank

    Agreement Use of eBanking with PIN and TAN Customer number: Name and address of account holder:

    Add to Reading List

    Source URL: www.wirecardbank.com

    Language: English - Date: 2016-01-14 06:57:56
    765

    Chesapeake Employers eServices Upgrade with Individual Logins With more focus on individual authentication and online user recognition, Chesapeake Employers is changing from a policy group login to individual logins, usi

    Add to Reading List

    Source URL: www.ceiwc.com

    Language: English - Date: 2015-07-30 09:25:53
      766Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

      Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2016-05-17 20:42:08
      767

      User-Centred Authentication Feature Framework Alain Forget Sonia Chiasson, Robert Biddle Carnegie Mellon University

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      Language: English - Date: 2016-03-23 23:24:01
        768

        ONC Data Brief 32, NovemberState and National Trends of Two-Factor Authentication for Non-Federal Acute Care Hospitals

        Add to Reading List

        Source URL: www.healthit.gov

        Language: English - Date: 2015-11-18 11:27:14
          769

          Best Practices for Privileged User PIV Authentication (Draft)

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2016-04-22 09:00:13
            770Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

            PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2014-12-09 05:42:43
            UPDATE