Computer access control

Results: 4654



#Item
731Computing / Software / Computer architecture / Smartphones / Wireless / Android / Mobile operating systems / Near field communication / Google Play / Mobile app / IOS / Mandatory access control

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2015-11-16 12:12:29
732Computing / Domain name system / Internet / Network architecture / Internet privacy / Computer network security / DNS hijacking / Hacking / Transmission Control Protocol / Proxy server / CNAME record / Captive portal

On Robust Covert Channels Inside DNS Lucas Nussbaum, Pierre Neyron and Olivier Richard Abstract Covert channels inside DNS allow evasion of networks which only provide a restricted access to the Internet. By encapsulatin

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2011-10-12 09:35:39
733Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
734Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:35:58
735Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

Public Comments Received on NIST SP: Electronic Authentication Guideline

Add to Reading List

Source URL: csrc.nist.gov

Language: English
736Internet privacy / World Wide Web / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computer security / Web analytics / Computing / Information privacy / Google Analytics / Opt-out / Privacy

Descrição:​ Privacy and cookie policy Projeto:​ Website boldint.com Privacy and cookie policy

Add to Reading List

Source URL: www.boldint.com

Language: English - Date: 2016-05-23 19:18:07
737Computer access control / Password / Authentication / HTTP cookie / Login / Pico / Security token

Bootstrapping adoption of the Pico password replacement system Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington {frank.stajano, graeme.jenkinson, jeunese.payne, max.s

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-08-28 15:17:52
738Computer access control / Identity management / Federated identity / Cloud standards / OpenID / OAuth / Security Assertion Markup Language / Password manager / Single sign-on / XRDS / Authentication / Phishing

Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2016-04-20 11:46:50
739Software / System software / Computing / MacOS / Computer access control / Windows / Directory services / Computer network security / Keychain / Kerberos / Active Directory / Single sign-on

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-05-25 18:19:43
740Computer security / Identity management / Cryptography / Computer access control / Access control / Authentication / Notary / Packaging / Password / Internet privacy / Privacy Commissioner / Privacy

State Services Commission

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:46:13
UPDATE