Computer access control

Results: 4654



#Item
91Wireless networking / Computing / Network architecture / Network management / Wireless ad hoc network / Packet delay variation / Computer network / Packet forwarding / ExOR / Routing / Media access control / Network switch

Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24, 2008 GeoMAC: Geo-Backoff based Co-operative MAC for V2V networks Sanjit Kaul and Marco Grutese

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2008-11-03 13:03:16
92Cryptography / Computer security / Security / Computer access control / Challengeresponse authentication / Password / Cryptographic nonce / Authentication / Server / Biometrics / Key / Public-key cryptography

WITH VAULTED VOICE VERIFICATION MY VOICE IS MY KEY R.C. Johnson and Terrance E. Boult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 13:04:18
93Cryptography / Computer access control / HID Global / IdenTrust / Authentication / Bank / Security / Computer security / EBAM

PDF Document

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2015-08-11 19:17:39
94Software / Computing / Computer access control / Identity management / Software distribution / As a service / Software as a service / Software industry / Provisioning / Password management / Password

» GROUP TEST l IdM, NAC & DLP Fischer International Fischer Identity v5.0 T

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2012-11-16 11:06:29
95Computer access control / Registered user / Password / Email / Glasgow Film Theatre / Prevention / Safety / Computing

Microsoft Word - Manual Anmeldung für User engl.docx

Add to Reading List

Source URL: www.dgfz-bonn.de

Language: English - Date: 2016-05-04 04:04:48
96Economy / Financial services / Computer access control / Finance / Online banking / Banking / Security token / Bank / Smart card / Direct bank / Authentication / Industrial and Commercial Bank of China

A new trend in China Easy and secure e-banking for everybody ICBC bank The challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:37
97Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1997-12-31 17:54:34
98Computer access control / Identity management / Computer security / Computing / Metadata standards / Security Assertion Markup Language / Authentication / EduGAIN / Workflow

MJRA1.4: First Draft of the Blueprint Architecture Milestone MJRA1.4

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-08-01 07:07:50
99Computing / Network architecture / Computer networking / Internet / IP traceback / Router / Traffic flow / Denial-of-service attack / Transmission Control Protocol / Packet loss / NetFlow

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-01-13 03:12:31
100Software / Internet privacy / Computing / Web browsers / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Safari

Safari Browser - Enable Cookies Overview The information below will help resolve a wide range of issues that can occur on our website when using the latest Safari browser. Cookies are small text files that certain sites

Add to Reading List

Source URL: content001.bet365.com

Language: English - Date: 2015-04-24 08:22:49
UPDATE