Email authentication

Results: 687



#Item
61SMS / Text messaging / Password / Email / Transaction authentication number / Cross-platform software / Web 2.0 / MinID / Technology / Mobile technology / Computing

Globalites_Servicecard_Silber-Schwarz.indd

Add to Reading List

Source URL: www.globality-health.com

Language: English - Date: 2013-02-18 04:29:37
62Computing / Email / Authentication / Fax / Password fatigue / Password policy / Security / Technology / Password

0143a_iAcccessReg)

Add to Reading List

Source URL: docs.otpp.com

Language: English - Date: 2015-07-18 13:28:02
63

POSTER: Deniable Anonymous Group Authentication Ewa Syta Ph.D. Student Yale University Email:

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2013-05-17 10:01:42
    64

    MAAWG_Email_Authentication_Paper_2008-07

    Add to Reading List

    Source URL: bbiw.net

    Language: English - Date: 2009-04-12 21:53:19
      65

      DYNAMED MOBILE APP NOW AVAILABLE Get answers to clinical questions everywhere you go with the new DynaMed mobile App. Easy, one-time authentication via email! DynaMed provides clinicians quick and easy access to evidence

      Add to Reading List

      Source URL: support.ebsco.com

      Language: English - Date: 2015-03-24 11:05:52
        66Security / Email authentication / Cryptographic software / Secure communication / Clipper chip / Disk encryption / National Security Agency / Pretty Good Privacy / Email encryption / Cryptography / Internet privacy / Computer security

        Bankston_short_biographical_summary

        Add to Reading List

        Source URL: static.newamerica.org

        Language: English - Date: 2015-05-04 13:25:41
        67Spamming / Computer crimes / Social engineering / Password / Phishing / HTTP cookie / Cross-site scripting / Email / Malware / Security / Computing / Computer security

        Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu

        Add to Reading List

        Source URL: www.chriskarlof.com

        Language: English - Date: 2012-01-02 15:39:31
        68Computing / Computer-mediated communication / Anti-spam techniques / Email spam / Spam / Whitelist / Open mail relay / Message transfer agent / Email authentication / Spamming / Email / Internet

        Using Early Results from the ‘spamHINTS’ Project to Estimate an ISP Abuse Team’s Task Richard Clayton Computer Laboratory, University of Cambridge JJ Thomson Avenue, CAMBRIDGE, CB3 0FD, United Kingdom

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2006-06-26 06:28:51
        69Authentication / Internet / Computing / Security / Password / Email

        Higher Ed. Student Guide Students who are members of a Higher Ed Organization hold Basic accounts. Being a member of an Organization makes it easy to interact with instructors and classmates. This Guide is written specif

        Add to Reading List

        Source URL: voicethread.com

        Language: English - Date: 2014-07-22 19:40:31
        70Computer security / Phishing / Spamming / Transaction authentication number / Password / Usability / Authentication / Email / HTTP cookie / Security / Computing / Social engineering

        Usability aspect of security October 30, Thursday) Scriber: Yamini Kannan This lecture is about a different side of security – the usability side of security – how do you ascertain that the technology being de

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:42
        UPDATE