正在加载图片...
Securing EC Communications access control Mechanism that determines who can legitimately use a network resource passive tokens Storage devices(e.g, magnetic strips) that contain a secret code used in a two-factor authentication system active tokens Small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system Electronic Commerc Prentice Hall 2006Electronic Commerce Prentice Hall © 2006 22 Securing EC Communications access control Mechanism that determines who can legitimately use a network resource passive tokens Storage devices (e.g., magnetic strips) that contain a secret code used in a two-factor authentication system active tokens Small, stand-alone electronic devices that generate one-time passwords used in a two-factor authentication system
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有