Access Authentication

Results: 2034



#Item
261Economy / Prevention / Computer access control / Cryptography / Identity documents / Access control / Authentication / Notary / Packaging / Password / HSBC

How to… Activate my new Security Device Note: Before activating your new Device, please note that it must be assigned to you by your System Administrator. If you are a System Administrator or End User and are logging o

Add to Reading List

Source URL: www.hsbcnet.co.uk

Language: English - Date: 2016-05-10 15:51:44
262Economy / Computer access control / Stock market / Finance / Access control / Authentication / Notary / Packaging / Deposit account / Security / Smart card

WDB-eBanking-Bedingungen_GK_DE_EN.indd

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2016-01-14 09:14:45
263Computer access control / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Security / Authenticator / Derivative test

Derivative Test Plan Company Name Contact Person Email address: Product / Service Name and Version:

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2016-06-17 18:31:49
264Computer access control / Economy / Identity documents / Prevention / Financial services / Password / Security / Telephone banking / Online banking / Authentication / Bank

Direct Banking Application Form

Add to Reading List

Source URL: www.crediteurope.com.mt

Language: English - Date: 2016-06-02 03:14:06
265Computer access control / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / LastPass / Dropbox / CCID / Gmail / Authentication / Password

YubiKey Edge and YubiKey Edge-n • YubiKey Edge and YubiKey Edge-n offer strong authentication via Yubico one-time passwords (OTP) and FIDO Universal 2nd Factor (U2F) with a simple tap or touch of a button

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:46
266Computer access control / Cryptography / Computer security / Access control / YubiKey / Authentication / Multi-factor authentication

Programming YubiKeys for Okta

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-04-26 12:45:09
267Computer access control / Teleconferencing / Educational technology / Web conferencing / Authentication / Technology

DDTC May 20, 2016 Webinar: IT Modernization Project Chat with Industry! Overview IT Modernization Project team provided an open discussion and requirement gathering session. The focus of this meeting was: 

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2016-05-24 17:09:22
268Software / Computing / Technology / Computer access control / Software requirements / Strong authentication / Requirement / Facebook / Specification / Authentication / Electronic voting / E-democracy

FP7 – CAPSD-CENT D4.2 – Technical Requirements and Specification of Platform and Pilots

Add to Reading List

Source URL: 185.26.51.181

Language: English - Date: 2016-04-29 02:32:18
269Computer access control / Cryptography / Computer security / Computing / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / LastPass / Time-based One-time Password Algorithm / One-time password / Password manager / CCID

YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button • Works instantly with no need to re-type p

Add to Reading List

Source URL: www.yubico.com

Language: English
270Computer access control / Computer security / Computing / World Wide Web / Human-based computation / Hacking / Social engineering / Spamming / CAPTCHA / Internet bot / Cross-site request forgery / Transaction authentication number

Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

Add to Reading List

Source URL: www2016.net

Language: English - Date: 2016-04-10 09:10:41
UPDATE