Passphrase

Results: 268



#Item
181Man-in-the-middle attack / Key / Public-key cryptography / Passphrase / Password strength / OTPW / Cryptography / Key management / Password

Using Voice to Generate Cryptographic Keys Fabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel Bell Labs, Lucent Technologies Murray Hill, NJ, USA Abstract In this position paper, we motivate and summarize our

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:35
182Cryptography / Passphrase / Association of American Universities / Academia / Password / Higher education / Indiana University Bloomington / The IU / Email / Indiana University / Indiana / North Central Association of Colleges and Schools

Setting Up Your First IU IT Account Every student must have an active IU network ID (username and password) in order to register for classes. Your IU username is your permanent IU IT account. Your permanent IU username w

Add to Reading List

Source URL: acp.indiana.edu

Language: English - Date: 2014-09-10 16:47:04
183Passphrase / Authentication / Password manager / Password strength / Security / Cryptography / Password

Directions to Unprotect, Protect, and Save as a template in Microsoft® Word 2010 ADD PROTECTION TO A DOCUMENT 1. Before you protect the document, make sure the cursor is on the first page, on the blank line above the fi

Add to Reading List

Source URL: azdeq.gov

Language: English - Date: 2014-05-05 15:36:35
184Form / Computing / Software / User interface techniques / Cryptography / Passphrase

How to Register for an ACP Course What do I need? You will need your IU IT username and passphrase. (Note: This is not the same as your Guest Account login. Your IU Guest Account (user name = personal email address) that

Add to Reading List

Source URL: acp.indiana.edu

Language: English - Date: 2014-09-08 15:13:57
185Data management / USB flash drive / Backup / Hard disk drive / Solid-state drive / Data recovery / Drive letter assignment / Passphrase / Data erasure / Computer hardware / Computing / Data

Guest: Michael Nicholas, ASSOCIATE Professor Computer Information Systems at Davenport University Topic: Wiped If Stolen

Add to Reading List

Source URL: www.mikenicholas.com

Language: English - Date: 2011-05-25 07:42:30
186Access control / Password / Salt / Self-service password reset / Information security / Passphrase / Authentication / Password manager / Password cracking / Security / Computer security / Cryptography

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.14 Information Resources – Password-based Authentication Approved July 18, 2005 Revised July 27, 2006

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2014-05-16 11:18:28
187Cryptographic software / Internet / Email / Hushmail / PGP / Webmail / Pseudonymity / Passphrase / HTTP cookie / Computing / Internet privacy / Cryptography

Real World Patterns of Failure in Anonymity Systems Richard Clayton, George Danezis, and Markus G. Kuhn University of Cambridge, Computer Laboratory, Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, United Kingdom

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2002-06-08 10:10:59
188World Wide Web / Select / Computing / User interface techniques / Form / HTML

Registration Instructions 1. Go to http://onestart.iu.edu and click login 2. Enter your Username and Passphrase 3. Follow the steps below to navigate to your Student Center:

Add to Reading List

Source URL: shrs.iupui.edu

Language: English - Date: 2014-01-25 15:26:24
189Password / 7-Zip / Passphrase / File / Zip / Software / Free software / System software

GUIDELINES Electronic Reporting for Ozone-Depleting Substances Part 3: Submitting ODS Data to EPA May 2014 Guidelines Part 3: Submitting ODS Data to EPA

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2014-05-27 13:30:22
190Cyberwarfare / Password / Passphrase / Crypt / Password strength / Password policy / Security / Computer security / Cryptography

COMPUTER PASSWORDS POLICY 1.0 PURPOSE This policy describes the requirements for acceptable password selection and maintenance to maximize

Add to Reading List

Source URL: www.chinleusd.k12.az.us

Language: English - Date: 2012-10-15 17:06:46
UPDATE