SecurID

Results: 158



#Item
31Social engineering / Computer crimes / Federated identity / HTTP / Phishing / Spamming / Password / SecurID / Two-factor authentication / Computing / Computer security / Software

PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
32Identity management / Advanced Encryption Standard / EMC Corporation / SecurID / Password / Multi-factor authentication / Authentication / Transaction authentication number / Phishing / Security / Computer security / Access control

Microsoft Word - CASQUE Paper.docx

Add to Reading List

Source URL: www.casque.co.uk

Language: English - Date: 2013-10-03 11:34:52
33Computer security / Cyberwarfare / Security / Password / SecurID / Kerberos

Stanford University July 26, 2014 The Murky Tangle of Web Authentication

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
34Harvest / Cyberwarfare / War / Digital media / Software / Advanced Encryption Standard / EMC Corporation / SecurID

Securely explore your data SQRRL 2.0 LAUNCH WEBINAR The Revolution in Cybersecurity and Linked Data Analysis with Richard Stiennon (IT-Harvest) and Luis Maldonado (Sqrrl)

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2015-03-23 16:08:37
35Human resource management / IRISS / Social work / Onboarding / SecurID / Social psychology / Management / Employment

Onboarding Condensed Checklist New Postdoc Hire: Complete Checklist can be found at: http://ucalgary.ca/hr/postdoc/getting-started Getting Prepared – Before You Start Yes

Add to Reading List

Source URL: www.ucalgary.ca

Language: English - Date: 2014-12-19 18:20:00
36Malware / Cryptography / Backdoor / Rootkits / Spyware / Password / One-time password / SecurID / Security / Cyberwarfare / Computer security

A Framework to Eliminate Backdoors from Response-Computable Authentication Shuaifu Dai1 , Tao Wei1,2∗ , Chao Zhang1 , Tielei Wang3 , Yu Ding1 , Zhenkai Liang4 , Wei Zou1 1 Beijing Key Lab of Internet Security Technolo

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
37Computer network security / Internet protocols / Internet standards / Secure Shell / Cryptographic protocols / Secure communication / SecurID / Security token / Telnet / Computing / Internet / Security

EURECOM VPN SSL for students User’s guide Table of Contents Introduction .................................................................................................................................................

Add to Reading List

Source URL: www.eurecom.fr

Language: English - Date: 2009-10-12 03:49:15
38Security / EMC Corporation / Computer network security / Advanced Encryption Standard / SecurID / Kerberos / Single sign-on / Authentication / System software / Software / VMware

Installing Horizon Workspace Horizon Workspace 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

Add to Reading List

Source URL: pubs.vmware.com

Language: English
39Network architecture / Cryptographic protocols / Advanced Encryption Standard / EMC Corporation / SecurID / Secure Shell / One-time password / Password / Virtual private network / Computing / Internet / Computer network security

EURECOM VPN SSL for students User’s guide Table of Contents Introduction .................................................................................................................................................

Add to Reading List

Source URL: www.eurecom.fr

Language: English - Date: 2014-10-02 09:35:28
40Cryptographic protocols / Tunneling protocols / Internet protocols / Computer security / IPsec / Authentication / SecurID / Password / Multi-factor authentication / Security / Cryptography / Access control

Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Perficient, Inc. Security 101 Security Core Concepts...

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-04-03 21:12:11
UPDATE