Access Authentication

Results: 2034



#Item
281Computer access control / Computing / Identity management / GARR / OpenID / AAI

Authentication and Authorisation for Research and Collaboration JRA.14 Future work Davide Vaghetti

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 10:41:42
282Software / World Wide Web / Free software / Apache HTTP Server / Reverse proxy / Hypertext Transfer Protocol / Httpd / Common Gateway Interface / Digest access authentication / Mod ssl / Mod proxy

Release Notes: Apache HTTP ServerApache HTTP Server Release Notes VersionSep/09

Add to Reading List

Source URL: www.midori-global.com

Language: English - Date: 2016-06-01 09:41:38
283Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

Yubico Best Practices: OATH-HOTP

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-19 11:38:08
284Computer access control / YubiKey / HMAC-based One-time Password Algorithm / Time-based One-time Password Algorithm / Password manager / One-time password / LastPass / CCID / Authentication / Password / Symantec / Dropbox

YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
285Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:29:05
286Computing / Computer architecture / Computer network security / Wireless networking / IEEE 802.11 / Local area networks / Cryptographic protocols / Wireless / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / Ubuntu / Cracking of wireless networks

Connecting to the Rovernet WPA2 Secured Wireless Network with with UbuntuIntreped Ibex) Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requir

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
287Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-08 14:24:54
288Computer access control / Economy / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Direct debit / Smart card / Electronic authentication

Business Conditions for Remote Communication (StandScope of services (1) The account/securities account holder may execute banking transactions by means of Remote Communication within the scope offered by

Add to Reading List

Source URL: www.corporates.commerzbank.com

Language: English - Date: 2015-03-03 06:21:28
289Free / Authentication / Business / Common law / Law / Roaming

Typing Quest / TypingMaster / NäppisTaituri Institutional license agreement THIS IS AN INSTITUTIONAL LICENSE AGREEMENT FOR ACCESS TO THE WEB-BASED TYPING TUTOR APPLICATION PUBLISHED BY TYPINGMASTER FINLAND OY.

Add to Reading List

Source URL: www.typingquest.com

Language: English - Date: 2016-04-07 04:55:16
290Computing / Computer network security / Wireless networking / IEEE 802.11 / Wireless / Local area networks / Wi-Fi / Wi-Fi Protected Access / Protected Extensible Authentication Protocol / IEEE 802.1X / Windows XP / Wireless security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows XP Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements in order to con

Add to Reading List

Source URL: www.it.mtu.edu

Language: English - Date: 2015-09-21 08:47:24
UPDATE