First Page | Document Content | |
---|---|---|
Date: 2013-03-04 21:29:09Computer access control Computer security Security Phishing Password Multi-factor authentication Authentication Transaction authentication number Passwd One-time password Security token | Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West LafayeAdd to Reading ListSource URL: spaf.cerias.purdue.eduDownload Document from Source WebsiteFile Size: 182,25 KBShare Document on Facebook |
Central Connecticut State University Elihu Burritt Library Newsletter CRASH Shown at Burritt LibraryDocID: 1qXF3 - View Document | |
http://www.LinuxSecurity.com Security Glossary:DocID: 1qOzI - View Document | |
http://www.LinuxSecurity.com Security Glossary:DocID: 1qI2L - View Document | |
March 17, 2016 MEMORANDUM FOR: GOES DCS LRGS Data UsersDocID: 1qyfU - View Document | |
EPING May 2007 This is an archived edition of EPing, first published in MayAlthough every effort has been made to preserve the original content, errors may have crept in and links may no longer be available. FromDocID: 1quoe - View Document |