Computer access control

Results: 4654



#Item
131Computer access control / Cryptography / Computer security / Prevention / Multi-factor authentication / Authentication / Financial technology / Password

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
132Computer access control / Identity management / Identity / Federated identity / OpenID / Digital identity / Internet privacy / Privacy / Online identity / Identity 3.0

Microsoft Word - ACTIVITIES - OISTE workshop reportdoc

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2012-11-14 04:38:45
133Computer access control / Computer security / Computing / Security token / Multi-factor authentication / Authentication / RSA SecurID / Mutual authentication / OAuth / OpenID / Electronic authentication / Extensible Authentication Protocol

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
134Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
135Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
136Computing / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Cayuse / User / Point and click / Software / Computer security

UCI Cayuse 424 Quick Start Guide for Principal Investigator’s Professional Profile Getting Started Cayuse 424 is supported in recent versions of Firefox

Add to Reading List

Source URL: www.research.uci.edu

Language: English - Date: 2016-04-08 18:31:46
137Economy / Financial technology / Finance / Payment systems / E-commerce / Computer access control / Mobile technology / Online banking / Transaction authentication number / Axis Bank / SMS banking / Bank

TERMS & CONDITIONS FOR PING PAY (MULTI-SOCIAL PAYMENT MOBILE APPLICATION): These terms and conditions form the contract between the User and Axis Bank and shall be in addition to and not in derogation of other terms and

Add to Reading List

Source URL: campaign.axisbank.com

Language: English - Date: 2015-05-05 08:51:11
138Computing / Computer access control / Software / Access control / Password / Security / User / Veterans of Foreign Wars / Login / Prepared statement / Form

DEPARTMENT REPORTING GUIDELINES

Add to Reading List

Source URL: www.vfwca.org

Language: English - Date: 2015-06-24 11:41:19
139Computing / Computer access control / Smartphones / Cloud clients / Personal computing / Information appliances / Security token / Multi-factor authentication / Touchscreen / IPhone / Token / Android

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
140Computing / Directory services / Software / Computer architecture / Computer access control / Lightweight Directory Access Protocol / Active Directory

Authentication, Authorisation and Windows Integration using SSSD Lawrence Kearney Mark Robinson

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2015-11-20 11:18:31
UPDATE