Access control

Results: 10445



#Item
761Ajax / Software architecture / Computer access control / Application programming interface / Technical communication / JSON / Web API / Authentication / File Transfer Protocol

API Documentation Version: IDnow GmbH – www.idnow.de

Add to Reading List

Source URL: www.idnow.eu

Language: English - Date: 2016-04-07 09:53:48
762Mobile virtual network operators / Mobile technology / Computer access control / Subscriber identity module / IPhone / Callback / Access Point Name / Roaming / Truphone / Prepay mobile phone / Delight Mobile

EKT1738 SILVER International SIM User Guide online MAY16

Add to Reading List

Source URL: www.telestial.com

Language: English - Date: 2016-05-31 23:18:35
763Computer access control / Computer network security / Virtual private networks / ESET / Internet privacy / Network architecture / Multi-factor authentication / Password / Authentication / One-time password / RADIUS / SoftEther VPN

Protect your VPN in 10 Minutes Looking to secure your VPN access in no time? ESET Secure Authentication gives your people super easy, secure access to your company network - from anywhere. Run The Installer ◆ Run the

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-19 03:58:22
764Neurology / Brain / Cerebrum / Vision / Perception / Evoked potential / Visual cortex / Steady state visually evoked potential / Auditory cortex / Motion perception / Stimulus control

NIH Public Access Author Manuscript Eur J Neurosci. Author manuscript; available in PMC 2014 November 01. NIH-PA Author Manuscript

Add to Reading List

Source URL: csea.phhp.ufl.edu

Language: English - Date: 2015-10-15 14:55:28
765Cloud infrastructure / Computer security / Cloud computing / Access control

Networking concept: Cloud With Padlock on digital background

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2016-02-24 15:28:02
766Computer access control / Access control / Access control list / Mandatory access control / Role-based access control / Privilege / WebDAV / User / PERMIS / Capability-based security / Superuser / NTFS

Intentional Access Management: Making Access Control Usable for End-Users

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-13 14:38:51
767Biometrics / Computer access control / Security / Cryptographic nonce / Cryptography / Password / Iris recognition / Challengeresponse authentication / Authentication / Private biometrics / Fuzzy extractor

PRIVV: Private Remote Iris-authentication with Vaulted Verification Michael J. Wilber, Walter J. Scheirer, Terrance E. Boult University of Colorado at Colorado Springs and Securics, Inc. Colorado Springs, CO, 80918, USA

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-07-06 12:46:22
768Electric vehicles / Electric vehicle network / Charging station / Electric car / Charge control / Electric vehicle / Open Charge Point Protocol / ChargePoint

PlugSurfing Extends Electric Car Charging Network to Cover E.On and Ebee in Germany Users of PlugSurfing can now access and pay for charging at two more networks Berlin, Emission-free driving in and between the

Add to Reading List

Source URL: www.plugsurfing.com

Language: English - Date: 2016-08-09 08:48:48
769Computer access control / Password / Multi-factor authentication / Authentication

GazeTouchPass: Multimodal Authentication Using Gaze and Touch on Mobile Devices Mohamed Khamis1 , Florian Alt1 , Mariam Hassib1,2 , Emanuel von Zezschwitz1 , Regina Hasholzner1 , Andreas Bulling3 1

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2016-02-13 07:07:53
770Firearm safety / Crime / Gun politics / Gun safety / Child access prevention law / American Academy of Pediatrics / Gun violence / Gun safe / Safety / Injury prevention / Violence / Gun control

State Advocacy AAP POSITION OVERVIEW

Add to Reading List

Source URL: www.aap.org

Language: English - Date: 2016-03-09 11:29:38
UPDATE