Basic access control

Results: 58



#Item
11Biometrics / Radio-frequency identification / Ubiquitous computing / Biometric passport / Data security / Machine-readable passport / Basic access control / Smart card / RFdump / Security / National security / Passports

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:24
12Geolocation / Command and control / Global Positioning System / Nuclear command and control / Internet / Access / Mobile phone tracking / Technology / Satellite navigation systems / Mobile technology

Appendices 111 Appendix I Basic Information for

Add to Reading List

Source URL: modi.mech.columbia.edu

Language: English - Date: 2013-06-05 17:33:08
13Alarms / Burglar alarm / Alarm management / Opc server / Fire alarm system / Access control / BIS / Alarm devices / Microsoft SharePoint / Safety / Security / Prevention

Engineered Solutions | BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecurity.com The state-of-the-art building management generation

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2012-07-10 09:02:34
14Government / Biometric passport / Biometrics / Data security / Information sensitivity / Radio-frequency identification / Basic access control / Russian passport / Machine-readable passport / Security / National security / Passports

ePassports ED:54 pm

Add to Reading List

Source URL: www.biometricsinstitute.org

Language: English - Date: 2011-07-12 20:38:13
15Network architecture / Internet standards / Telnet / Password / Secure Shell / SAINT / Transmission Control Protocol / File Transfer Protocol / Basic access authentication / Computing / Internet / Internet protocols

ABC Coffee ASV Vulnerability Details Report Generated: April 18, 2014 Part 1. Scan Information Scan Customer Company: ABC Coffee Shop Date scan was completed: April 17, 2014

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:49:11
16Password / ID-based encryption / Authentication / Transaction authentication number / Security / Cryptography / Access control

An Improved Remote User Authentication Scheme using Bilinear Pairings Sunder Lala & K.K.Goyalb a Department of Mathematics, Institute of Basic Science, Dr.B.R.Ambedkar University, Khandari, AgraU.P)

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-26 05:40:58
17Internet protocols / HTTP / Two-factor authentication / Authentication / Password / Access token / Basic access authentication / One-time password / Security token / Security / Computer security / Access control

ePass OTP Authentication System White Paper ePass OTP Authentication System White Paper

Add to Reading List

Source URL: www.rs-computer.com

Language: English - Date: 2009-12-15 09:43:31
18Passports / Human–computer interaction / ISO standards / Biometrics / Data security / Biometric passport / Radio-frequency identification / Basic access control / Contactless smart card / Security / National security / Ubiquitous computing

A Note on the Relay Attacks on e-passports? The Case of Czech e-passports Martin Hlav´aˇc1 and Tom´aˇs Rosa1,2 [removed] and [removed] 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-24 13:33:18
19Identity management / Authentication / Notary / Packaging / Two-factor authentication / Federated identity / Password / Electronic authentication / Multi-factor authentication / Security / Cryptography / Access control

Electronic Authentication Animations – Two-factor Authentication (Script) Introduction Joe needs to implement an e-authentication module in an information system. colleague Alan introduces the three basic authenticati

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
20Identity management / Authentication / Notary / Packaging / Two-factor authentication / Federated identity / Password / Electronic authentication / Multi-factor authentication / Security / Cryptography / Access control

Electronic Authentication Animations – Two-factor Authentication (Script) Introduction Joe needs to implement an e-authentication module in an information system. colleague Alan introduces the three basic authenticati

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
UPDATE