Keychain Access

Results: 37



#Item
1Computer access control / Radio electronics / Wireless / Radio-frequency identification / Automotive accessories / Authentication / Challengeresponse authentication / Remote keyless system / Keychain / Transponder / Distance-bounding protocol

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
2Software / System software / Computing / MacOS / Computer access control / Windows / Directory services / Computer network security / Keychain / Kerberos / Active Directory / Single sign-on

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-05-25 18:19:43
3Computing / Software / Computer architecture / Directory services / Windows Server / Active Directory / Windows / Keychain / Message transfer agents / Server / Lightweight Directory Access Protocol / MacOS

Mac Integration BasicsAdding a Mac to a Windows or Other Standards-Based Network
 Course Guide Contents Introduction

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-04-03 03:52:18
4Software / Computer access control / Computer security / Cryptographic software / Identity management / Hacking / Password manager / Password / Keychain / Cross-site scripting / Clickjacking / Crypt

Protecting Users Against XSS-based Password Manager Abuse Ben Stock Martin Johns

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
5Mac OS X / Smartphones / Mach / Mac App Store / App Store / Apple ID / Keychain / IOS / Sandbox / Software / Computing / Computer architecture

Unauthorized Cross-App Resource Access on MAC OS X and iOS Luyi Xing Indiana University Bloomington

Add to Reading List

Source URL: cdn.onemorething.nl

Language: English - Date: 2015-06-17 15:27:11
6Password / LogMeIn / Keychain / Security token / Two-factor authentication / Challenge-response authentication / Access control / Security / Computer security

Whitepaper Cubby: A secure solution A technical overview of Cubby’s secure, enterprise-grade infrastructure.

Add to Reading List

Source URL: www.cubby.com

Language: English - Date: 2014-12-01 07:40:11
7Cryptographic software / Keychain Access / Keychain / Key management / Portable software / Password / Passphrase / GNOME Keyring / Password fatigue / Software / Cryptography / Mac OS X

APPLE LOGIN KEYCHAIN WHAT IS KEYCHAIN? Apple has a built in password safe called Keychain. When an application asks “Would like this to be saved in your keychain” it is talking about this built in software. The appli

Add to Reading List

Source URL: music.indiana.edu

Language: English - Date: 2015-02-10 16:13:37
8Access control / System software / Identity management systems / Cryptographic software / Password strength / Password policy / Password / Keychain / Security

Guidelines to change your password before its expiry date If after having gone through these guidelines you are still experiencing difficulties with changing your password, please contact the Helpdesk: By Telephone: 020

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-02 02:28:08
9Burglar alarm / Remote keyless system / Keychain / Access control / Wireless security / Door / Security / Safety / Alarms

Reliance_comBrochure.indd

Add to Reading List

Source URL: www.citiguard.com.au

Language: English - Date: 2012-12-13 01:40:12
10Password / HMAC / Keychain / Cryptographic software / Digest access authentication / Password strength / Cryptography / Computer security / Security

CS255: Cryptography and Computer Security Winter 2008 Programming Project #1 Due: Friday, February 8th, 2008.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-01 18:07:18
UPDATE