## When worlds collide: the security of converged networks Tackling converged threats: building a security-positive environment Featured this issue: T he success of the Stuxnet worm in exploiting a number of attack vectors to spy on and disrupt the operation of industrial process control systems
โฆ LIBER โฆ
RSA over SecurID?
โ Scribed by Cath Everett
- Publisher
- Elsevier Science
- Year
- 2005
- Weight
- 177 KB
- Volume
- 2
- Category
- Article
- ISSN
- 1742-6847
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
RSA replacing SecurID tokens
๐
Article
๐
2011
๐
Elsevier Science
๐
English
โ 227 KB
RSA hack leaves status of SecurID uncert
๐
Article
๐
2011
๐
Elsevier Science
๐
English
โ 243 KB
C omputer security must always tread the fine line between efficacy and usability, but regular two-factor authentication (2FA) using physical tokens crosses this line. Users need to remember their token, while technical services departments are charged with the job of maintaining and administering e
SecurID authentication for BayRS routers
๐
Article
๐
1996
๐
Elsevier Science
๐
English
โ 151 KB
Information-theoretic secure verifiable
โ
Qiu Gang; Wang Hong; Wei Shimin; Xiao Guozhen
๐
Article
๐
2006
๐
Wuhan University
๐
English
โ 352 KB
RSA challenge
โ
Ed Wehde
๐
Article
๐
1998
๐
Elsevier Science
๐
English
โ 242 KB
Batch RSA
โ
Amos Fiat
๐
Article
๐
1997
๐
Springer
๐
English
โ 656 KB