𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Passwords to protection

✍ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1998
Tongue
English
Weight
121 KB
Volume
17
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


Abstracts of Recent Articles and Literature

added. "The security stays with the document at all times. Every time you try to access it, no matter where it is, you have to get reauthorized to see it.


πŸ“œ SIMILAR VOLUMES


Password protection
πŸ“‚ Article πŸ“… 1989 πŸ› Elsevier Science βš– 104 KB
Password protection: the next generation
✍ Tom Rowan πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 139 KB

## Password protection: the next generation Tom Rowan, security consultant, Magirus Since the dawn of computing, passwords and access codes have been used to protect access to computer systems. These passwords protect user accounts. Systems ask for a username and password before access is granted.

Group management of RFID passwords for p
✍ Yuichi Kobayashi; Toshiyuki Kuwana; Yoji Taniguchi; Norihisa Komoda πŸ“‚ Article πŸ“… 2009 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 601 KB

## Abstract When an RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that the RFID tag is stuck on an item. We use the low‐cost RFID tag that has the access control function using a password, and we propose

Password to success
πŸ“‚ Article πŸ“… 1989 πŸ› Elsevier Science 🌐 English βš– 273 KB
Passwords
✍ David Duke πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 122 KB