![Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token Computer access control / Computer security / Security / Phishing / Password / Multi-factor authentication / Authentication / Transaction authentication number / Passwd / One-time password / Security token](https://www.pdfsearch.io/img/219984f8d666b34a76863bd3ed041ef6.jpg) Date: 2013-03-04 21:29:09Computer access control Computer security Security Phishing Password Multi-factor authentication Authentication Transaction authentication number Passwd One-time password Security token | | Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West LafayeAdd to Reading ListSource URL: spaf.cerias.purdue.eduDownload Document from Source Website File Size: 182,25 KBShare Document on Facebook
|