Computer access control

Results: 4654



#Item
221Computer access control / Obfuscation / Prevention / Password / Security / Passwd / Identity management / Cryptographic software

March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data Users

Add to Reading List

Source URL: dcs4.noaa.gov

Language: English - Date: 2016-03-24 15:28:31
222Computer access control / Computer security / Computing / Security Assertion Markup Language / Single sign-on / Authentication / Spotfire / HTTP cookie / Identity provider / TIBCO Software

Business Team Busy Working Talking Concept

Add to Reading List

Source URL: spotfire.tibco.com

Language: English - Date: 2016-06-30 13:53:16
223Wireless networking / Network performance / Computing / Telecommunications engineering / Media access control / Information theory / Data transmission / Packet radio / Duplex / Throughput / Exposed node problem / Transmission Control Protocol

RCTC: Rapid Concurrent Transmission Coordination in Full Duplex Wireless Networks Wenjie Zhou, Kannan Srinivasan and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2013-08-25 15:21:10
224Security / Prevention / Safety / Crime prevention / National security / Public safety / Physical security / Perimeter security / Security guard / Computer security / Access control / Identity document

Introduction to Security Awareness Briefing Office of Security @ NOAA

Add to Reading List

Source URL: www.osec.doc.gov

Language: English - Date: 2012-02-22 10:48:16
225Security / Computer access control / Access control / Computer security / Identity management / Authentication / Notary / Delegation / Authorization / PERMIS / User

Proceedings Template - WORD

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-10 20:06:13
226Microsoft / Computer access control / Software / Password / Security / Login / Outlook.com / Self-service password reset / Password fatigue

Reset Your Password You will need the email associated with your account! 1. Access the ISAS website at http://ilacadofsci.com/ 2. Click on the Sign In link, just as if you were signing in. 3. Since you don’t remember

Add to Reading List

Source URL: ilacadofsci.com

Language: English - Date: 2013-12-02 19:39:14
227Computer security / Security / Computer access control / Access control / Identity management / Role-based access control / Access control list / Access Control Matrix / Group / PERMIS / Attribute-Based Access Control

UNIVERSITY OF TRENTO DIPARTIMENTO DI INGEGNERIA E SCIENZA DELL’INFORMAZIONEPovo – Trento (Italy), Via Sommarive 14 http://www.disi.unitn.it

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
228Cryptography / E-commerce / Signature / Computer law / Computer access control / Public key infrastructure / Authentication / Public key certificate / Electronic signature

Zentrum für sichere Informationstechnologie – Austria Secure Information Technology Center – Austria A-1030 Wien, SeidlgasseTel.: (+–0 Fax: (+–66 DVR:

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2015-09-02 03:28:44
229Economy / Computer access control / Money / Financial technology / Payment systems / E-commerce / Digital currencies / Electronic funds transfer / Strong authentication / 3-D Secure / Multi-factor authentication / Authentication

  European Banking Authority One Canada Square (Floor 46) Canary Wharf

Add to Reading List

Source URL: www.isignthis.com

Language: English - Date: 2016-02-14 19:52:32
230Prevention / Computer access control / Cryptography / Gesture / Security / Multi-touch / Authentication / Password

User-Generated Free-Form Gestures for Authentication: Security and Memorability Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-18 21:13:10
UPDATE