Access Authentication

Results: 2034



#Item
361

SuperMatrix www.bkguard.com A single card prevents unauthorized access and man-in-the-middle attacks. ①USER AUTHENTICATION (DEMO www.bkguard.com/demo)

Add to Reading List

Source URL: www.bkguard.com

Language: English - Date: 2015-07-03 05:00:45
    362Economy / Financial services / Money / Online banking / E-commerce / Computer access control / Payment systems / Transaction authentication number / Password / Cash machine / Computer security / Bank

    E-banking security notice The following information will help you increase the security of your bank transactions on the Internet. Please observe this information when using the Internet and particularly when making use

    Add to Reading List

    Source URL: www.wirecardbank.com

    Language: English - Date: 2015-12-08 09:42:10
    363Cryptography / FIPS 201 / Standards / Identity documents / Computer access control / Personal identification number / Smart card / Authentication / PIV / Public-key cryptography

    NIST Interagency Report 7863

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-06-17 14:09:24
    364Security / Prevention / Computer access control / Identity documents / Access control / Cybercrime / Identity management / Password / Mobile security / Authentication / Transaction authentication number / Computer security

    Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz Ruhr-University Bochum, Germany, {firstname.lastname}@rub.de

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:57
    365Economy / Computer access control / Stock market / Finance / Access control / Authentication / Notary / Packaging / Deposit account / Security / Smart card

    WDB-eBanking-Bedingungen_PK_DE_EN.indd

    Add to Reading List

    Source URL: www.wirecardbank.com

    Language: English - Date: 2015-10-06 05:34:23
    366Network architecture / Emerging technologies / Configuration management / Software-defined networking / Network protocols / OpenFlow / American brands / Access control / Computer network / Cisco Systems / Network switch / Hewlett Packard Enterprise Networking

    Authentication for Resilience: the Case of SDN Dongting Yu1 , Andrew W. Moore1 , Chris Hall2 , and Ross Anderson1 1 Computer Laboratory, University of Cambridge 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2013-12-20 08:55:40
    367Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

    +entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

    Add to Reading List

    Source URL: www.entrust.com

    Language: English - Date: 2016-01-14 11:24:30
    368Computing / Software / Computer access control / Academic publishing / Andrew W. Mellon Foundation / Federated identity / Ithaka Harbors / Proxy server / Authentication / Android / Shibboleth / Project MUSE

    LOGIN PASSWORD ISSUE BRIEF Meeting Researchers

    Add to Reading List

    Source URL: www.sr.ithaka.org

    Language: English - Date: 2015-09-27 15:59:43
    369Family Educational Rights and Privacy Act / Privacy / Internet privacy / Cryptography / Authentication / Computer security / Security

    Student Privacy and eCommons eCommons allows site participants to interact with each other within a site. Depending on which tools an instructor uses in their course site, students may be able to have access to the name

    Add to Reading List

    Source URL: registrar.ucsc.edu

    Language: English - Date: 2014-08-31 11:32:39
    370Computing / Technology / Software / Mobile phones / Computer access control / Information appliances / Cloud clients / Smartphones / Mobile app / Security token / Mobile device management / Mobile device

    Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

    Add to Reading List

    Source URL: www.entrust.com

    Language: English
    UPDATE