Access Authentication

Results: 2034



#Item
231Remote desktop / Computer access control / Citrix Systems / XenApp / Smart card / Multi-factor authentication / Security token / Password manager / Single sign-on / Card reader / Authentication / Access token

SafeSign Identity Client & Citrix Smart card logon for Citrix XenApp Citrix XenApp Business Challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:27
232Computer access control / Cryptography / Computer network security / Smart card / Ubiquitous computing / Authentication / Computer security / Mobile device / IPhone / Security token

Mobility in Healthcare Easy access and control of medical information Secure Identification in Healthcare

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
233Computer access control / Access control / Identity management / Authentication / Notary / Packaging / Authorization / Password / User / Java Authentication and Authorization Service

Hudson Security Architecture Winston Prakash

Add to Reading List

Source URL: hudson-ci.org

Language: English - Date: 2012-02-24 08:32:09
234Computer access control / Identity management / Federated identity / Access control / Authentication / Notary / Password manager / Password / Google Account / Login / User / Multi-factor authentication

“I’m Stuck!”: A Contextual Inquiry of People with Visual Impairments in Authentication

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
235Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
236Contract law / Digital rights / Internet privacy / Terms of service / Privacy / Password / Reddit / Authentication / Data aggregation / Legal aspects of file sharing

Terms of Use VERSAIC INC. ("Versaic") provides access to its services (the "Services") subject to the following Terms of Use, which constitute a legal contract between you as either an individual or a legal entity (“Yo

Add to Reading List

Source URL: supervalu.versaic.com

Language: English - Date: 2016-08-01 05:29:50
237Ajax / Software architecture / Computer access control / Application programming interface / Technical communication / JSON / Web API / Authentication / File Transfer Protocol

API Documentation Version: IDnow GmbH – www.idnow.de

Add to Reading List

Source URL: www.idnow.de

Language: English - Date: 2016-04-07 09:53:48
238Cybercrime / Computer access control / ESET / Antivirus software / AutoRun / Phishing / Multi-factor authentication / Computer security / Authentication / David Harley / ESET NOD32

February 2014 Feature Article: Phishing Scam Update Table of Contents Phishing Scam Update ................................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2014-04-17 09:04:58
239Computer access control / Radio electronics / Wireless / Radio-frequency identification / Automotive accessories / Authentication / Challengeresponse authentication / Remote keyless system / Keychain / Transponder / Distance-bounding protocol

Peripheral Authentication for Autonomous Vehicles Nisha Panwar Ben-Gurion University of the Negev, Israel

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:38
240Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
UPDATE