Access Authentication

Results: 2034



#Item
331Cryptography / Security / Packaging / Access control / Biometrics / Identification / Surveillance / Authentication / Validation / AU10TIX

036047_FINAL GID LOGO_1.eps

Add to Reading List

Source URL: www.vixverify.com

Language: English - Date: 2016-03-21 00:35:26
332

Access Management Network and System authentication, data/service authorization, password/credential management Physical Security Environmental controls, Control of access to critical facilities, equipment and/or media,

Add to Reading List

Source URL: www.vascan.org

Language: English - Date: 2010-08-17 10:17:16
    333Cryptography / Prevention / Computer access control / Security / Access control / Authentication / Notary / Packaging / Password / Questionnaire / Job interview / Cognitive password

    Where Have You Been? Using Location-Based Security Questions for Fallback Authentication Alina Hang Media Informatics Group University of Munich (LMU)

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-21 12:56:55
    334Computer access control / Access control / Cryptography / Computer security / FIDO Alliance / Authentication / YubiKey / Password / Multi-factor authentication / Hypertext Transfer Protocol / Challengeresponse authentication

    FIDO U2F Raw Message Formats FIDO Alliance Proposed Standard 14 May 2015 This version: https://fidoalliance.org/specs/fido-undefined-undefined-psfido-u2f-raw-message-formats-v1.0-undefined-pshtml Prev

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-06-29 13:40:34
    335Computing / Computer access control / Identity management / Computer security / Federated identity / Free software / Java enterprise platform / OpenAM / ForgeRock / Toyota / Telematics / Multi-factor authentication

    CASE STUDY: TOYOTA MOTOR EUROPE Toyota Motor Europe Delivers ‘Connected Car’ Experience with ForgeRock OpenAM Satellite navigation systems, smart phones, applications, and online services are rapidly improving the e

    Add to Reading List

    Source URL: www.forgerock.com

    Language: English - Date: 2015-06-10 15:37:06
    336Computer security / Security / Cryptography / Identity management / Computer access control / IAM / Authentication / Biometrics

    INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors

    Add to Reading List

    Source URL: meetings.internet2.edu

    Language: English - Date: 2014-11-06 16:31:04
    337Cryptography / Computer access control / Computer security / Certificate authority / IdenTrust / Identity theft / Digital identity / Multi-factor authentication / Authentication / Smart card / E-commerce / Health Insurance Portability and Accountability Act

    The Payment Factory: Strengthening Compliance and Improving Internal Controls for Corporate Treasurers IdenTrust

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:47
    338Wirecard / Computer access control / Online banking / Etan / Transaction authentication number / East Timor and Indonesia Action Network / Fax / Maestro

    eBanking First Use Information on the eBanking services of Wirecard Bank AG All you need is a PC with Internet access, the eTAN Generator and your ec/Maestro card to authorize your payments. Before using our eBanking ser

    Add to Reading List

    Source URL: www.wirecardbank.com

    Language: English - Date: 2015-05-12 04:27:22
    339Computer access control / E-commerce / Online banking / Cybercrime / Security token / Bank / Transaction authentication number / User / Password / Computer security / Multi-factor authentication / Guardian Analytics

    Online Banking User Guide Business Online Security The security of your information is one of our most important responsibilities. You can be confident, knowing that Alpine Bank is dedicated to ensuring the highest level

    Add to Reading List

    Source URL: www.alpinebank.com

    Language: English - Date: 2013-12-17 13:20:47
    340Identity management / Computer access control / Federated identity / Access control / Authentication / Notary / Knowledge-based authentication / Multi-factor authentication / Know your customer / Analytics / Electronic authentication / Digital identity

    White Paper The Most Important Question in Customer/Constituent Identity Management Discover the answers for balancing increased value

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:44:10
    UPDATE