Computer access control

Results: 4654



#Item
751Computer access control / Contract law / Internet privacy / Factum Arte / HTTP cookie / Password / Registered user / Arte / Contract / Web content

Website conditions for access and use. This section includes information about the conditions for access and use of the Website that might be known by the user. This information is needed for the purposes provided in th

Add to Reading List

Source URL: www.factum-arte.com

Language: English - Date: 2014-02-11 09:22:58
752Microsoft / Software / Computer access control / Identity management / Password / Security / Login / Credential / Outlook.com

Microsoft Word - how to pull content from the PMP into Core Publisher March 2015.doc

Add to Reading List

Source URL: mediad.publicbroadcasting.net

Language: English - Date: 2015-04-07 15:50:00
753Computing / Network performance / Computer architecture / Flow control / Transmission Control Protocol / RDMA over Converged Ethernet / Remote direct memory access / Throughput / Head-of-line blocking / Packet loss / Transport layer / Fluid queue

Congestion Control for Large-Scale RDMA Deployments Yibo Zhu1,3 Haggai Eran2 Daniel Firestone1 Chuanxiong Guo1 Marina Lipshteyn1 Yehonatan Liron2 Jitendra Padhye1 Shachar Raindel2 Mohamad Haj Yahia2 Ming Zhang1 1

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2015-07-29 16:55:34
754Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
755Computing / Identity management / Internet privacy / Privacy / Computer access control / End user / Information privacy / Personal /  Inc. / HTTP cookie / Password / Database / Internet forum

  PRIVACY POLICY AND PROTECTION OF PERSONAL DATA 1.- INTRODUCTION By entering your personal data, you give your consent to its incorporation into data files belonging to MAHOU, S.A. and CERVECERA INDEPENDIENTE, S.A., bo

Add to Reading List

Source URL: www.cervezasalhambra.com

Language: English - Date: 2016-02-25 08:30:08
756Cryptography / Security / Computer security / Computer access control / Authenticator / Nok Nok Labs / Authentication / FIDO Alliance / Fido

FIDO UAF Authenticator-Specific Module API FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-asm-api-v1.0pshtml Previous versio

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-03-30 14:07:07
757Computer security / Computer access control / Security / Prevention / Authentication / Multi-factor authentication / Identity theft / Money laundering / Security token / Information security / Internet security / Identity management

Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
758Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:42
759Data / Computing / Information technology / Computer access control / ISO/IEC 11179 / Knowledge representation / Records management / Nok Nok Labs / Authentication / Authenticator / Data type / Code

FIDO UAF Authenticator Metadata Statements v1.0 FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-authnr-metadata-v1.0-ps20141208.html Pre

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2015-03-30 14:07:03
760Cryptography / Computer security / Security / ISO standards / Computer network security / Computer access control / Smart card / Ubiquitous computing / Authentication / Public-key cryptography / FIPS 140-2 / Security and safety features new to Windows Vista

Microsoft Word - SC037 _2015__v3

Add to Reading List

Source URL: www.stc.tid.gov.hk

Language: English - Date: 2015-10-01 12:03:19
UPDATE