Computer Security Institute

Results: 1676



#Item
801Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
802Security / Password / Access control / Computer network security / Knowledge-based authentication / Transaction authentication number / Direct debit / Automated Clearing House / Password policy / Payment systems / Computer security / Electronic commerce

National Institute for Occupational Safety and Health (NIOSH) National Personal Protective Technology Laboratory (NPPTL) Technology Evaluation Branch (TEB)

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2014-08-26 09:47:43
803Cryptography / Cryptographic software / Password / Security token / Salt / S/KEY / Privileged password management / One-time password / Security / Computer security / Access control

Authenticating Mobile Device Users Through Image Selection1 Wayne Jansen The National Institute of Standards and Technology Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
804Password / Cryptography / Security token / Authentication / Biometrics / Salt / Two-factor authentication / Password manager / Security / Access control / Computer security

Authenticating Users on Handheld Devices1 Wayne A. Jansen The National Institute of Standards and Technology Gaithersburg, Maryland, USA [removed] Abstract - Adequate user authentication is a persistent probl

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
805Cryptographic protocols / Computer network security / Internet protocols / Internet standards / Secure communication / Bluetooth / Security token / Transport Layer Security / Authentication / Computing / Security / Technology

A Location-Based Mechanism for Mobile Device Security Wayne Jansen The National Institute of Standards and Technology Abstract While mobile handheld devices, such as cell phones

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-07-01 01:00:00
806Security / Surveillance / Quality management / Iris / National Institute of Standards and Technology / Privacy / Biometrics / Iris recognition / University of Cambridge Computer Laboratory

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2009-10-22 14:50:35
807Computer security / Aglets / Mobile agent / PERMIS / X.509 / Software agent / Public key certificate / Authorization certificate / Privilege Management Infrastructure / Cryptography / Public-key cryptography / Key management

Privilege Management of Mobile Agents Wayne Jansen, Tom Karygiannis National Institute of Standards and Technology Abstract: Most mobile agent systems use internal data structures within an agent to control and specify i

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
808Science and technology in the United States / Security / Livermore /  California / Idaho National Laboratory / Smart grid / Sandia National Laboratories / Computer security / Pacific Northwest National Laboratory / SCADA / United States Department of Energy National Laboratories / Battelle Memorial Institute / Technology

Working Together to Achieve the Energy Sector’s Roadmap Vision Cybersecurity for Energy Delivery Systems (CEDS)

Add to Reading List

Source URL: www.naseo.org

Language: English - Date: 2012-11-15 11:58:03
809Ecosystem / Online identity / Steering / Biology / Systems science / Cyberwarfare / Computer network security / National Strategy for Trusted Identities in Cyberspace / Systems ecology

Information Age Consultancy Response to NSTIC NOI Prepared for: National Institute of Standards and Technology, US Department of Commerce, [removed] Prepared by: Daniel “Dazza” Greenwood, JD July 22, 2011

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-23 03:10:44
810Information Networking Institute / Nova Southeastern University Graduate School of Computer and Information Sciences / American Association of State Colleges and Universities / California State University /  San Bernardino / Southern California

CALIFORNIA STATE UNIVERSITY SAN BERNARDINO CYBER SECURITY Cy b erCor ps :

Add to Reading List

Source URL: ids.csusb.edu

Language: English - Date: 2013-09-09 18:37:20
UPDATE