Trusted path

Results: 23



#Item
11Roaming / RedCARE / GSM / Burglar alarm / Mobile Network Code / Technology / Mobile technology / Wireless

Redcare GSM Roaming Technical product information Redcare GSM Roaming protects customers with a grade 4 dual path alarm signalling system that uses BT’s trusted Redcare network. The dual path system uses both a phone l

Add to Reading List

Source URL: www.redcare.bt.com

Language: English - Date: 2015-01-09 08:10:14
12System software / Windows Vista / Comparison of privilege authorization features / Computer network security / Password / Phishing / User Account Control / Trusted path / Keystroke logging / Software / Computing / Computer crimes

Operating System Framed in Case of Mistaken Identity Measuring the success of web-based spoofing attacks on OS password-entry dialogs Cristian Bravo-Lillo1 Lorrie Cranor1,2

Add to Reading List

Source URL: lorrie.cranor.org

Language: English - Date: 2012-10-15 13:39:22
13Trusted computing / Next-Generation Secure Computing Base / PlayReady / Copy Control / Trusted Platform Module / InterTrust Technologies / Copy protection / OMA DRM / Protected Media Path / Computer security / Digital rights management / Copyright law

Technological Copyright Enforcement and Open Access Volker Grassmuck for Open Archives Forum Workshop[removed]HU Berlin

Add to Reading List

Source URL: www.oaforum.org

Language: English - Date: 2003-10-17 10:49:35
14Design / Computer security / User interface / Virtual reality / Usability / Trusted path / Principle of least privilege / User / End-user development / Computing / Human–computer interaction / Software

User Interaction Design for Secure Systems Ka-Ping Yee Report No. UCB/CSD[removed]May 2002

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2002-05-31 13:32:33
15Copyright law / Cryptography / Trusted Computing / Public safety / Emergency management / Trusted path / Trusted system / Safety / IBM Tivoli Storage Manager / Security / Computer security / Business law

Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture Timothy E. Levin1 , Jeffrey S. Dwoskin2 , Ganesha Bhaskara3 Thuy D. Nguyen1 , Paul C. Clark1 , Ruby B. Lee2 Cynthia

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
16The Work Number / Authentication / Personal identification number / Transaction authentication number / Login / Internet privacy / User / Password manager / Trusted path / Security / Access control / Password

TALX - The Work Number General Frequently Asked Questions What is The Work Number? The Work Number is the leading provider of employment and income verifications. It is used by lenders, property managers, and others wh

Add to Reading List

Source URL: hr.od.nih.gov

Language: English - Date: 2013-09-10 08:21:00
17Computer network security / Trusted path / Two-factor authentication / Operating system / One-time password / Password / Access control / XTS-400 / Rootkit / Security / Computer security / Identity management

PDF Document

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2008-12-03 09:21:20
18Software / CAPTCHA / Password / Malware / Trusted Computing / Software as a service / Reverse Turing test / Computer security / Trusted path / Computing / Security / Computer network security

PDF Document

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-03-25 14:27:46
19Crime prevention / National security / Electronic commerce / Secure communication / Ring / Operating system / Trusted path / Multilevel security / Trusted system / Computer security / Security / Computer network security

The Trusted Function in Secure Decentralized Processing

Add to Reading List

Source URL: pt.withington.org

Language: English - Date: 2003-03-19 14:04:01
20Computer network security / Trusted Computer System Evaluation Criteria / Trusted computing / Authentication / Trusted computing base / Trusted system / Information security / Password / Trusted path / Security / Computer security / Access control

NCSC-TG-017 Library No[removed],479 Version 1 FOREWORD A Guide to Understanding Identification and Authentication in Trusted Systems

Add to Reading List

Source URL: www.csirt.org

Language: English - Date: 2011-07-04 18:31:58
UPDATE