<--- Back to Details
First PageDocument Content
Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token
Date: 2013-03-04 21:29:09
Computer access control
Computer security
Security
Phishing
Password
Multi-factor authentication
Authentication
Transaction authentication number
Passwd
One-time password
Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Download Document from Source Website

File Size: 182,25 KB

Share Document on Facebook

Similar Documents

Central Connecticut State University  Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt Library

DocID: 1qXF3 - View Document

http://www.LinuxSecurity.com   Security Glossary:

http://www.LinuxSecurity.com Security Glossary:

DocID: 1qOzI - View Document

http://www.LinuxSecurity.com   Security Glossary:

http://www.LinuxSecurity.com Security Glossary:

DocID: 1qI2L - View Document

March 17, 2016  MEMORANDUM FOR: GOES DCS LRGS Data Users

March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data Users

DocID: 1qyfU - View Document

EPING May 2007 This is an archived edition of EPing, first published in MayAlthough every effort has been made to preserve the original content, errors may have crept in and links may no longer be available. From

EPING May 2007 This is an archived edition of EPing, first published in MayAlthough every effort has been made to preserve the original content, errors may have crept in and links may no longer be available. From

DocID: 1quoe - View Document