Computer access control

Results: 4654



#Item
641Computer access control / Computer security / Federated identity / Identity / Identity management / Single sign-on / Authentication / Security Assertion Markup Language / Shibboleth / Phishing / Microsoft account / Password

AusCERT ConferenceUser Centric Identity Management Audun Jøsang and Simon Pope CRC for Enterprise Distributed Systems Technology (DSTC Pty Ltd)∗

Add to Reading List

Source URL: folk.uio.no

Language: English - Date: 2008-05-05 07:06:30
642Security / Prevention / Safety / Computer security / Identity management / Access control / Crime prevention / National security / NetIQ / Authentication / User Activity Monitoring / Password

IPS blue graphic white back final

Add to Reading List

Source URL: www.netiq.com

Language: English - Date: 2016-05-04 13:42:02
643Computer access control / Computer security / Access control / Software / YubiKey / One-time password / PIV / Command-line interface

Yubico PIV Tool Command Line Guide Command Line Reference YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n Yubico PIV Tool Command Line Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-14 11:18:50
644Computing / Internet privacy / Software / World Wide Web / Hypertext Transfer Protocol / Computer access control / HTTP cookie / Web analytics / Internet marketing / Local shared object / Behavioral targeting / Opt-out

Cookie Policy Web Version 1.0 Cookie Policy Introduction

Add to Reading List

Source URL: www.iveco.com

Language: English - Date: 2015-06-11 09:38:35
645Computer access control / Cryptography / Computer security / Encyclopdia Britannica / Scottish Enlightenment / Authentication / Security / Britannica / Login

Authentication Options for Libraries  IP Address  Library Card Barcode To sign in using Library Card Barcode Access: Go to http://ebooks.eb.com 1. Click on the Login button located top right hand side 2. Next, sele

Add to Reading List

Source URL: edu.eb.com

Language: English - Date: 2015-08-10 21:36:45
646Computer architecture / Computing / Computer network security / Microsoft Windows / Wireless networking / IEEE 802.11 / Cryptographic protocols / Wi-Fi Protected Access / Wi-Fi / Control Panel / Windows Vista / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows Vista Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
647Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
648Cryptography / Computer access control / YubiKey / Windows Server / Authentication / Active Directory / Certificate authority

YubiKey PIV Deployment Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-03-25 15:58:10
649Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-12 12:42:03
650Computer access control / Access control / Authentication / Notary / Packaging / Biometrics

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
UPDATE