Access Authentication

Results: 2034



#Item
571Risk management / Access control / Identity management / Actuarial science / Emergency management / Authentication / Credential / Complete Boolean algebra / Security / Risk / Management

Risk Assessment in Distributed Authorization Peter Chapin Christian Skalka X. Sean Wang

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2013-05-09 09:08:56
572Network architecture / Hypertext Transfer Protocol / Chunked transfer encoding / Digest access authentication / Basic access authentication / HTTP/1.1 Upgrade header / Email / File Transfer Protocol / Push technology / Computing / HTTP / Internet

Microsoft Word - Specification of Web Ingest in WIS.docx

Add to Reading List

Source URL: www.wis-jma.go.jp

Language: English - Date: 2014-01-27 00:55:06
573Authentication / InterDigital / Biometrics / OpenID / Password / Two-factor authentication / Security / Access control / Multi-factor authentication

& NEWS RELEASE BIO-key and InterDigital to Introduce OpenID based Secure Multifactor Authentication for Android Smartphones at Mobile World Congress

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-02-18 08:33:17
574Authentication / Packaging / Credit card / FedEx / United States Postal Service / Technology / Security / Notary / Access control

CASE WESTERN RESERVE UNIVERSTIY Office of the University Registrar Apostille/Authentication Release Form First Name: EmplID:

Add to Reading List

Source URL: case.edu

Language: English - Date: 2014-11-10 14:49:16
575Computer security / Transaction authentication number / Password policy / Password strength / Password / Security / Access control

Understanding and Using Your Client Web Portal Overview - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 How do I login to the CWP? - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Add to Reading List

Source URL: cwp.morningstar.com

Language: English - Date: 2015-03-21 04:05:39
576System software / Internet / Computer network security / RADIUS / Secure Shell / Virtual private network / Transport Layer Security / Lightweight Directory Access Protocol / Two-factor authentication / Computing / Internet protocols / Internet standards

Array Vendor Product Access Direct Dimension (WxHxD) 17 X 3.5 X 21.5

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2010-04-29 11:00:12
577Computer network security / Internet protocols / Self-certifying File System / Password authentication protocol / Security token / Kerberos / Access token / Password / RADIUS / Computing / Computer security / Microsoft Windows

To appear in the 19th ACM Symposium on Operating Systems Principles (SOSP ’03) Decentralized User Authentication in a Global File System Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek MIT Comput

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2003-08-31 20:05:26
578Two-factor authentication / Smart card / Credential / Access control / Identity assurance / Computer security / Security / Identity management / FIPS 201

Microsoft Word - NextgenID_news_Mike_Garcia_hired_031715

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2015-04-07 14:23:55
579Cryptography / Access control / Videotelephony / Advanced Encryption Standard / EMC Corporation / SecurID / Smart card / Radio-frequency identification / Authentication / Security / Technology / Ubiquitous computing

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2011-09-08 18:03:53
580Password / One-time password / Two-factor authentication / Time-based One-time Password Algorithm / Authentication / Security / Cryptography / Access control

For Immediate Release IIJ Launches One-time Password Application “IIJ SmartKey” --Develops free, standard-compliant application for iPhone and Android devices-TOKYO—April 3, 2015—Internet Initiative Japan Inc. (

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2015-04-06 01:57:18
UPDATE