Computer access control

Results: 4654



#Item
741Online banking / Computer access control / Transaction authentication number / Wirecard / International Bank Account Number / Deposit account / Bank

Agreement Use of eBanking with PIN and TAN Customer number: Name and address of account holder:

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2016-01-14 06:57:56
742Computer access control / Access control / Prevention / Password / Security / Computer security / Login

Telecom Cook Islands Ltd Telecom WiFi Guide Client End 2012

Add to Reading List

Source URL: www.bluesky.co.ck

Language: English - Date: 2012-09-11 02:07:01
743Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 20:42:08
744HTML / Access control / Attribute-Based Access Control / Computer access control / Web development / Form / HTML element / Computing / Software

Virtual ID Concepts Kaspar Etter

Add to Reading List

Source URL: www.digitalid.net

Language: English - Date: 2014-05-23 10:03:07
745

Ownership and Immutability Inference for UML-based Object Access Control Yin Liu Department of Computer Science Rensselaer Polytechnic Institute

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2007-03-27 16:05:56
    746Computer access control / Identity management / Metadata standards / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Meteor

    Microsoft Word - MeteorV4_ReleaseNotes_FINAL_02092012

    Add to Reading List

    Source URL: www.meteornetwork.org

    Language: English - Date: 2014-10-21 09:11:01
    747Internet privacy / Computing / Hypertext Transfer Protocol / World Wide Web / Marketing / Computer access control / HTTP cookie / Internet advertising / Information privacy / Ghostery / Session / Privacy

    EEL ref: XVIFINAL LEGAL NOTICE

    Add to Reading List

    Source URL: www.fimewc.com

    Language: English - Date: 2015-04-14 03:01:30
    748Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

    PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-12-09 05:42:43
    749Economy / Computer access control / Cryptography / Reputation management / Cryptocurrencies / Reputation / Social status / Blockchain / Anonymity / Internet privacy / Civil law common law) / Decentralization

    OPEN REPUTATION  THE DECENTRALIZED REPUTATION PLATFORM    Lincoln Cannon     

    Add to Reading List

    Source URL: openreputation.net

    Language: English - Date: 2015-05-13 21:45:48
    750Cryptography / Key management / Public key infrastructure / Identity management / Computer access control / Social networking services / Internet privacy / Authentication / Privacy / Web of trust / Airbnb / Public key certificate

    Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data A White Paper from Rebooting the Web of Trust

    Add to Reading List

    Source URL: www.weboftrust.info

    Language: English - Date: 2016-06-08 16:57:37
    UPDATE