Access control

Results: 10445



#Item
221Computer access control / Cryptography / Computer security / Password / Security / Cybercrime / Identity management / Salt / Phishing / Crypt / Key derivation function / Pass

Passpet: Convenient Password Management and Phishing Protection Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-30 18:17:59
222Access control / Authorization / Computer access control

Code Description Child Health Plan Plus HMO Authorization Requirement

Add to Reading List

Source URL: www.coaccess.com

Language: English - Date: 2016-07-08 15:23:51
223Cryptography / Directory services / Computing / Computer security / Computer access control / Free software / FreeIPA / Red Hat / 389 Directory Server / Kerberos / Lightweight Directory Access Protocol / Authentication

FreeIPA www.freeipa.org Identity Management in the FOSS World Simo Sorce Principal Software Engineer

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-05-13 02:19:28
224Security / Prevention / Physical security / Digital media / IP camera / Internet Protocol / Surveillance / Video / Video surveillance / Access control / Napco Security Technologies

Enterprise class access control solutions From our full-featured software, CardAccess 3000, CCTV, DVRs, badging to blazing fast controllers, Continental has been at the forefront in enterprise class access control and s

Add to Reading List

Source URL: www.napcosecurity.com

Language: English - Date: 2014-01-16 14:15:43
225Watermarking / Cryptography / Access control / Digital watermarking / Watermark / Security / Steganography / Ingemar Cox / JPEG / Cinavia / Audio watermark

An Adaptive Digital Image Watermarking Technique for Copyright Protection Chang-Hsing Lee (李建興) and Yeuan-Kuen Lee* (李遠坤) Department of Computer Science, Chinese Culture University 55 Hwa Kang Rd., Yang Ming

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44
226Technology / Mobile telecommunications / Computer access control / Subscriber identity module / Wireless / LTE

SIMalliance_Market_Insights_2016

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2016-04-20 04:28:48
227Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
228Media access control / Computing / IEEE 802.11 / Network architecture / Arbitration inter-frame spacing / IEEE 802 / DCF Interframe Space / Signal-to-interference-plus-noise ratio / Transmission Control Protocol / Channel / Distributed coordination function

Network Simulator 3 (nsPatches (Version 1.0) for Vehicle-2-Vehicle Broadcast Simulations DevelopedThese patches have been developed jointly at WINLAB, Rutgers University and West Virginia University as

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2016-02-18 14:51:55
229Computer access control / Access control / Computer security / Cryptography / YubiKey / One-time password / Personalization

YubiKey for YubiCloud Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
230Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
UPDATE