![Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy](https://www.pdfsearch.io/img/d10a9106ab5872c3f5416a4ec622c661.jpg) Date: 2016-05-17 20:42:08Computer access control Identity management Federated identity Cybercrime Security token Password Multi-factor authentication Electronic authentication Phishing Authentication One-time password Password policy | | Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of CambridgeAdd to Reading ListSource URL: www.cl.cam.ac.ukDownload Document from Source Website File Size: 1,08 MBShare Document on Facebook
|