Access Authentication

Results: 2034



#Item
291Computer access control / Cryptography / Computing / Computer security / YubiKey / Universal 2nd Factor / HMAC-based One-time Password Algorithm / Time-based One-time Password Algorithm / One-time password / CCID / Dropbox / LastPass

YubiKey NEO-n • YubiKey NEO-n offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV) -- all with a simple tap or touch of a button • Works instantly wi

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:42
292Economy / Financial services / Money / Online banking / E-commerce / Computer access control / Payment systems / Transaction authentication number / Password / Cash machine / Computer security / Cheque

E-banking security notice The following information will help you increase the security of your bank transactions on the Internet. Please observe this information when using the Internet and particularly when making use

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2016-01-14 06:53:29
293Computer access control / Access control / Prevention / Computer security / Password / Login / Transaction authentication number

Maryland Campaign Reporting Information System (MD CRIS)

Add to Reading List

Source URL: campaignfinancemd.us

Language: English - Date: 2011-12-18 20:40:23
294Software / Cryptographic software / Computer security / Computer access control / Google Chrome extensions / Mozilla add-ons / Dashlane / Cryptography / Password / Salt / OpenSSL / Multi-factor authentication

Dashlane Security White Paper v2.8 Dashlane Security Whitepaper March 2016 1. General Security Principles a. Protection of User Data in Dashlane

Add to Reading List

Source URL: www.dashlane.com

Language: English - Date: 2016-03-23 12:49:58
295Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
296Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-02-10 08:34:16
297Computing / Identity management / Computer access control / Metadata standards / Security Assertion Markup Language / GARR / Software / Data

Authentication and Authorisation for Research and Collaboration JRA.14 Updates on MJRA1.3 Deliverable Davide Vaghetti

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 10:41:42
298Cryptography / Security / Computer security / Computer access control / Computer network security / Barcodes / Cybercrime / Hypermedia / QR code / Authentication / Password / SQRL

SAVVIcode: Preventing Mafia Attacks on Visual Code Authentication Schemes (Short Paper) Jonathan Millican and Frank Stajano , University of Cambridge Computer Laboratory, Cambr

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 10:08:14
299Identity management / Federated identity / Privacy / Computer access control / Electronic authentication / Public administration / Privacy Impact Assessment / Information privacy / Internet privacy / Authentication / Medical privacy / Privacy-enhancing technologies

Microsoft Word 310442DB - BusApp - IVS PIA from John Edwards FINAL.DOC

Add to Reading List

Source URL: www.realme.govt.nz

Language: English - Date: 2015-05-13 01:45:18
300Cryptography / Computer security / Computer access control / Public key infrastructure / Public-key cryptography / Key management / Password / Salt / Key / Kerberos / Challengeresponse authentication / Passphrase

Pico without public keys Frank Stajano1 , Bruce Christianson2 , Mark Lomas3 Graeme Jenkinson1 , Jeunese Payne1 , Max Spencer1 , Quentin Stafford-Fraser1 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:25:32
UPDATE