Access Authentication

Results: 2034



#Item
591McAfee / Security token / One-time password / Two-factor authentication / Single sign-on / Password / Authentication / McAfee VirusScan / Password manager / Security / Computer security / Access control

Data Sheet McAfee One Time Password Two-factor authentication for secure login

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-11-20 19:51:55
592McAfee / Security token / One-time password / Two-factor authentication / Single sign-on / Password / Authentication / McAfee VirusScan / Password manager / Security / Computer security / Access control

Data Sheet McAfee One Time Password Two-factor authentication for secure login

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-11-20 19:51:55
593Two-factor authentication / Password / Authentication / Single sign-on / Password manager / Private biometrics / Security / Access control / Biometrics

ID Director for IBM ESSO May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-05-16 10:53:56
594Identification / Fingerprints / Biometrics / Two-factor authentication / Authentication / Password / Security / Access control / Cryptography

ID Director Allscripts May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-05-16 10:14:11
595Iris recognition / University of Cambridge Computer Laboratory / Surveillance / Identity management / Authentication / Iris / Password / Security / Access control / Biometrics

Proceedings of The 4th International Platform on Integrating Arab e-Infrastructure in a Global Environment e-AGE 2014

Add to Reading List

Source URL: asrenorg.net

Language: English - Date: 2015-01-15 05:34:56
596Virtual reality / Gesture / Password / Computing / Authentication / Internet protocols / Security / User interface techniques

ShakeOnIt: An Exploration Into Leveraging Social Rituals For Information Access David Cranor, Amanda Peyton, Arlene Persaud, Rajiv Bhatia, Sinbae Kim, and V. M. Bove MIT Media Lab MIT Sloan Harvard GSD

Add to Reading List

Source URL: excedrin.media.mit.edu

Language: English - Date: 2013-07-01 08:09:55
597Cryptographic protocols / Digest access authentication / Request for Comments / Basic access authentication / Concurrent Versions System / Apache HTTP Server / 2.0 / Software / HTTP / Computing

Authentication in Apache HTTP Server 2.1 Justin R. Erenkrantz University of California, Irvine Slides: http://www.erenkrantz.com/oscon/

Add to Reading List

Source URL: www.erenkrantz.com

Language: English - Date: 2010-08-20 02:52:00
598Cryptography / Biometrics / Access control / Surveillance / Fingerprint recognition / Authentication / Fingerprint / IBM / Security / Identification / Fingerprints

NEWS RELEASE BIO-key to Exhibit Fingerprint Authentication Solutions for ISAM at IBM Pulse 2014 IBM Validated and NIST rated technology for Identity and Access Management Wall, NJ, February 19, BIO-key Internation

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-02-21 09:08:16
599Network architecture / Internet standards / Telnet / Password / Secure Shell / SAINT / Transmission Control Protocol / File Transfer Protocol / Basic access authentication / Computing / Internet / Internet protocols

ABC Coffee ASV Vulnerability Details Report Generated: April 18, 2014 Part 1. Scan Information Scan Customer Company: ABC Coffee Shop Date scan was completed: April 17, 2014

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2014-04-22 13:49:11
600Money / BPAY / Bank / Cheque / Transaction authentication number / Payment systems / Business / Finance

Summerland’s Phone Banking Instructional Sheet The first time you use this service, dialYou’ll be prompted to enter your member number and initial access code (supplied by

Add to Reading List

Source URL: www.bankingonfootball.com

Language: English - Date: 2014-12-23 23:11:57
UPDATE