Access control

Results: 10445



#Item
891Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
892

Wooster: Mandatory Access Control for Rails  Julian Bangert, Alexander Lin, Julia Huang    Abstract    We introduce Wooster, a system for enforcing flexible mandatory access control policies 

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:49:57
    893Cryptography / Computer access control / YubiKey / Windows Server / Authentication / Active Directory / Certificate authority

    YubiKey PIV Deployment Guide

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-03-25 15:58:10
    894Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

    YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-04-12 12:42:03
    895Computer access control / Access control / Authentication / Notary / Packaging / Biometrics

    Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    896Internet privacy / Privacy / Information privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Opt-out / Personally identifiable information / Cookie / Local shared object / Directive on Privacy and Electronic Communications

    Privacy and Data Usage Policy with regard to the Personal Information of the Visitors of this Website 1. Introduction

    Add to Reading List

    Source URL: incadea.staginglh.com

    Language: English - Date: 2015-11-03 14:53:31
    897

    Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

    Add to Reading List

    Source URL: seclab.illinois.edu

    Language: English
      898Computer access control / Password / Login / Transaction authentication number / Self-service password reset / Password manager

      www.bgzbnpparibas.pl InfolineCalls charged according to the operator pricing User manual

      Add to Reading List

      Source URL: www.pf.bgzbnpparibas.pl

      Language: English - Date: 2016-06-07 09:30:03
      899Theoretical computer science / Mathematics / Theory of computation / Computability theory / Models of computation / Mathematical logic / Formal methods / Algorithm / Turing machine / Randomized algorithm / IP / Alan Turing

      Rooter: A Methodology for the Typical Unification of Access Points and Redundancy Jeremy Stribling, Daniel Aguayo and Maxwell Krohn A BSTRACT Many physicists would agree that, had it not been for congestion control, the

      Add to Reading List

      Source URL: pdos.csail.mit.edu

      Language: English - Date: 2005-04-09 16:37:16
      900Technology / Digital media / Mobile app / Internet access / Internet

      TAKING CONTROL OF YOUR MOBILE DATA COSTS MODA

      Add to Reading List

      Source URL: www.asavie.com

      Language: English - Date: 2016-04-20 11:17:53
      UPDATE