Password

Results: 27667



#Item
591Prevention / Computer access control / Cryptography / Gesture / Security / Multi-touch / Authentication / Password

User-Generated Free-Form Gestures for Authentication: Security and Memorability Abstract: This paper studies the security and memorability of free-form multitouch gestures for mobile authentication. Towards this end, we

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-18 21:13:10
592Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
593Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
594Computer hardware / Computing / High-definition television / Publishing / Television technology / Video signal / Device independent file format / TeX / Digital Visual Interface / Password

Dexterity Ventures Inc./Place2Give Data Terms of Use This document sets out the dissemination policy for the charity and aggregated donor profiling data. It is based on the premise that providing broader access to the i

Add to Reading List

Source URL: www.dexterityventures.com

Language: English - Date: 2016-03-24 13:33:25
595Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token

Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

Add to Reading List

Source URL: spaf.cerias.purdue.edu

Language: English - Date: 2013-03-04 21:29:09
596Wireless networking / Computing / Wireless / Technology / Wi-Fi / Password / Login / Wireless security / Wi-Fi Direct

Wireless Accessing ConnSCU Internet Wireless from Android (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:49:44
597Software / User interface techniques / Point and click / Click consonant / Button

Create Incident (trouble ticket): Login to phonebill.gmu.edu using your Net ID name and Mesa password. Click login. You will then see the “home”, or main, page. Your role in Pinnacle is “Department Manager”.

Add to Reading List

Source URL: telecomadmin.gmu.edu

Language: English - Date: 2015-08-28 11:43:10
598Security / Prevention / Safety / Actuarial science / Password / Risk management / Public health / Elm

Microsoft Word - 325495_1.docx

Add to Reading List

Source URL: cme.uthscsa.edu

Language: English - Date: 2014-06-10 11:20:11
599Security / Prevention / Computer security / Certificate authorities / Content-control software / Symantec / Password

Proven business platform with high ROI

Add to Reading List

Source URL: www.whd.global

Language: English - Date: 2016-03-30 09:23:43
600Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Login / Self-service password reset / Password policy

GAP Access 2-Step Authentication 1. Access the GAP Access Login page. Enter your ID and password, click Login 2. One of the challenge questions the user provided an answer to when signing up for GAP

Add to Reading List

Source URL: www.isac.org

Language: English - Date: 2014-12-01 12:43:45
UPDATE