Computer access control

Results: 4654



#Item
111Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
112Computer access control / Cryptography / Computer security / Password / Security / Cybercrime / Identity management / Salt / Phishing / Crypt / Key derivation function / Pass

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-30 18:17:59
113Access control / Authorization / Computer access control

Code Description Child Health Plan Plus HMO Authorization Requirement

Add to Reading List

Source URL: www.coaccess.com

Language: English - Date: 2016-07-08 15:23:51
114Cryptography / Directory services / Computing / Computer security / Computer access control / Free software / FreeIPA / Red Hat / 389 Directory Server / Kerberos / Lightweight Directory Access Protocol / Authentication

FreeIPA www.freeipa.org Identity Management in the FOSS World Simo Sorce Principal Software Engineer

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-05-13 02:19:28
115Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
116Technology / Mobile telecommunications / Computer access control / Subscriber identity module / Wireless / LTE

SIMalliance_Market_Insights_2016

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-04-20 04:28:48
117Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
118Computer access control / Access control / Computer security / Cryptography / YubiKey / One-time password / Personalization

YubiKey for YubiCloud Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
119Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
120Software / Computer access control / Obfuscation / Password / Security / Form / Pass / Invoice / Self-service password reset

1. Go to https://members.nacda.com 2. On the left side, choose ‘My Information’ to input your login information. If you do not remember your password, select ‘Forgot Password’ and an email will be sent with a l

Add to Reading List

Source URL: grfx.cstv.com

Language: English - Date: 2016-07-15 10:36:24
UPDATE