Computer access control

Results: 4654



#Item
841Cryptography / FIPS 201 / Standards / Smart cards / Computer access control / ISO standards / Ubiquitous computing / ISO/IEC / Authentication / PIV / Cryptographic protocol / Public-key cryptography

ITL Bulletin: Improved Security and Mobility Through Updated Interfaces for PIV Cards (July 2015)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-07-21 08:41:09
842Economy / Business / Security / Automatic identification and data capture / Supply chain management / Computer security / Access control / Logistics / Radio-frequency identification / Track and trace

Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains

Add to Reading List

Source URL: cocoa.ethz.ch

Language: English - Date: 2013-05-23 02:09:57
843Computer access control / Password / Security / Login / Outlook.com / Microsoft account

Online Application Part 1 – Accessing the System This instruction guide is for currently certified firms seeking renewal and firms applying for the first time. Part 1 provides instructions for accessing the system and

Add to Reading List

Source URL: sch.thesupplierclearinghouse.com

Language: English - Date: 2011-08-15 01:34:05
844

Foundation for a Time Interval Access Control Model Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, and Thuy D. Nguyen Computer Science Department, Naval Postgraduate School Monterey, CA 93943, USA {fbafinid, l

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:13
    845Security / Computing / Computer networking / Access control / Computer access control / Named data networking / Computer security / Computer network security / Content centric networking / Computer network / Router / IBAC

    Interest-Based Access Control for Content-Centric Networks ∗ Cesar Ghali Marc A. Schlosberg

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:18:45
    846Computing / Software / System software / Directory services / Computer access control / Proxy server / Path / French Directory / Tar / Ping

    Privacy-preserving Ways to Estimate the Number of Tor Users Sebastian Hahn and Karsten Loesing {sebastian,karsten}@torproject.org Tor Tech Report

    Add to Reading List

    Source URL: research.torproject.org

    Language: English - Date: 2012-08-07 14:29:33
    847Online education / Education / Computing / Computer access control / Open educational resources / Webmail / Online chat / Massive open online course / Registered user / OpenHPI / Iversity / Gmail

    IMPROVING THE ONBOARDING USER EXPERIENCE IN MOOCS Jan Renz, Thomas Staubitz, Jaqueline Pollack, Christoph Meinel Hasso Plattner Institute (GERMANY) Abstract A lot of research has been done in maintaining and increasing t

    Add to Reading List

    Source URL: hpi.de

    Language: English - Date: 2015-02-06 03:57:20
    848Software / Computer access control / Computer security / Cryptographic software / Identity management / Hacking / Password manager / Password / Keychain / Cross-site scripting / Clickjacking / Crypt

    Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    849Security / Prevention / Computer security / Safety / Data security / Cryptography / National security / Information security / Security controls / Access control / Password / ISO/IEC 27001:2005

    Apollo Education Group Information Security Asset Management Responsibility and Acceptable Use Standards Document

    Add to Reading List

    Source URL: www.apollo.edu

    Language: English - Date: 2016-02-19 07:01:47
    850Wireless networking / Cryptographic protocols / Computer access control / Computer network security / Authentication protocol / Mutual authentication / Digest access authentication / Extensible Authentication Protocol / Authentication / Man-in-the-middle attack

    Man-in-the-middle in Tunnelled Authentication Cambridge Security Protocols Workshop, April 2003 N. Asokan, Kaisa Nyberg, Valtteri Niemi Nokia Research Center

    Add to Reading List

    Source URL: asokan.org

    Language: English - Date: 2015-04-08 16:31:41
    UPDATE