password-based love

Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word password-based.

Examples

  • That on-premises component becomes the central point for enabling control over password-based authentication, and the provisioning of SaaS services and the immediate de-provisioning of them when it's determined an employee's use of SaaS should be terminated.

    Novell rolls cloud-security service 2010

  • U-Safe, password-based security protection softwere, is also built into Launchpad and can be activated at the user's discretion.

    August 2006 - Fareastgizmos.com 2006

  • Financial institutions and government should consider a number of steps to reduce online fraud, including: 1. Upgrading existing password-based single-factor customer authentication systems to two-factor authentication.

    Archive 2004-12-01 Jim Horning 2004

  • Financial institutions and government should consider a number of steps to reduce online fraud, including: 1. Upgrading existing password-based single-factor customer authentication systems to two-factor authentication.

    FDIC seeks an end to account-hijacking identity theft Jim Horning 2004

  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems

    unknown title 2011

  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems

    unknown title 2011

  • Yet, traditional password-based authentication remains the most prevalent authentication protocol on the Internet, as the International Telecommunication

    Light Blue Touchpaper Sören Preibusch 2010

  • "Guideline on secure password-based, authentication protocol with key exchange."

    Light Blue Touchpaper Sören Preibusch 2010

  • For changing core account data, you still need the primary (password-based) login credentials.

    Planet Python 2010

  • NEW Encrypt check box makes it easier than ever to secure confidential files using password-based AES encryption

    ePHOTOzine News Feed 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.