CAVE-based authentication

Results: 1



#Item
1Internet protocols / Two-factor authentication / Authentication / Password / Computer network security / Authenticator / CAVE-based authentication / IEEE 802.1X / Security / Computer security / Access control

10 - Challenge questions and secondary authentication Shing-hon Lau February 13th, [removed][removed] Usable Privacy and Security

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-02-13 18:25:38
UPDATE