Computer access control

Results: 4654



#Item
291Computing / Computer network security / Computer security / Software / Computer access control / Directory services / RADIUS / NetIQ eDirectory / TACACS / Integrated Windows Authentication / Comparison of mail servers

RadiusNT & RadiusX The Ultimate RADIUS Servers For Windows NT, Linux, Solaris & Cobalt Appliances Version 4.0

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2006-11-25 04:29:55
292Computing / Software / Computer access control / Prevention / Humancomputer interaction / World Wide Web / User / Hyperlink / Login / Password

Professional Development by intelitek User Guide November 2015 Catalog # Rev C

Add to Reading List

Source URL: inspired.intelitek.com

Language: English - Date: 2016-06-14 14:22:26
293Cryptography / Notary / Public-key cryptography / Computer access control / Proxy Mobile IPv6 / Authentication / Secret sharing / Digital signature / Encryption / Resultant

EM 3A: Efficient Mutual Multi-hop Mobile Authentication Scheme for PMIP Networks Sanaa Taha∗ , Sandra C´espedes∗† , and Xuemin (Sherman) Shen∗ ∗ Department of Electrical and Computer Engineering, University of

Add to Reading List

Source URL: www.cec.uchile.cl

Language: English - Date: 2012-02-11 16:01:44
294Computer access control / Computer security / Computing / Computer network security / Federated identity / Wireless networking / Internet protocols / Authentication / IEEE 802.1X / RADIUS / Single sign-on / Mutual authentication

Secure Authentication System for Public WLAN Roaming ‡ Yasuhiko Matsunaga †

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-10 19:56:51
295Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
296Computing / Computer security / Computer access control / Computer network security / Wireless networking / Extensible Authentication Protocol / IEEE 802.1X / RADIUS / Authentication / Mutual authentication / Supplicant / Single sign-on

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
297Computer access control / Access control / Computer security / Password / Security / Login / Identity management / Self-service password reset / Password fatigue

mySMHCchart Frequently Asked Questions What is mySMHCchart? Our patient portal, mySMHCchart, was designed to help SMHC patients simplify their lives. This secure and confidential web-based patient portal allows you to:

Add to Reading List

Source URL: www.smhc.org

Language: English - Date: 2014-06-27 15:23:58
298Internet privacy / Computer access control / Hypertext Transfer Protocol / World Wide Web / Computing / Computer security / Web analytics / HTTP cookie / Information privacy / Google Analytics / Opt-out / Targeted advertising

COOKIE POLICY In accordance with article 13 of Italian Legislative Decree no, “Regulation for the protection of Personal Data” (hereafter simply “Regulation”), this information segment explains what cooki

Add to Reading List

Source URL: www.italmatch.it

Language: English - Date: 2015-08-03 05:58:18
299Online banking / Money / Financial services / Finance / Computer access control / Password / Security / Transaction authentication number / SMS banking / Password fatigue

INTERNET BANKING TERMS & CONDITIONS RC 575 (“the Customer”) hereby confirm and agree that the following terms

Add to Reading List

Source URL: corporate.wemabank.com

Language: English - Date: 2015-09-17 12:05:56
300Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Computer security / Privacy policy / Privacy / Data security

INFORMATION ON THE PROCESSING OF PERSONAL DATA This page describes how to manage the site CANDIANI DENIM SPA in relation to the processing of personal data of users who consult it. This notice is given pursuant to art.

Add to Reading List

Source URL: www.candianidenim.it

Language: English - Date: 2014-11-19 11:58:47
UPDATE