A random access ID could be securly transmitted between the client and the server. An external listener would have more difficulties to record the access log.
Use a hash of the access log as an additional kind of password. The access log (Computer/Access Time/Access ID) is known to the client and the server. Intruders would need to listen and record the communication from the beginning.