AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
By providing access based on the individual’s repetition of a rhythm pattern received at a portable computing device, implementations provide an access control technique that is unobtrusive and easy ...
Securing decentralized and complex university networks is always going to be a challenge, but here’s how PAM can help. Then, there are the uniquely collegiate challenges that higher education IT ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results