Access Authentication

Results: 2034



#Item
601Risk management / Actuarial science / Identity management / Access control / Computer security / Credential / Authentication / Authorization / Security / Management / Risk

Risk Management for Distributed Authorization Christian Skalka∗ University of Vermont X. Sean Wang University of Vermont

Add to Reading List

Source URL: web.vtc.edu

Language: English - Date: 2013-05-09 09:08:56
602Pluggable authentication module / Linux PAM / Secure Shell / Kerberos / Password / Security token / Access token / Authentication / Software / Computer security / System software

Stanford University July 26, 2014 AFS and PAM

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
603Authentication / Notary / Packaging / Business development / Biometrics / Security / Business / Access control

Position: Status: Location Inside Sales Representative Full Time Position

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2015-03-17 09:04:36
604Fingerprints / Biometrics / Two-factor authentication / Authentication / Password / Identity theft / Security / Access control / Identification

NEWS RELEASE World Class Healthcare Technology Providers Presenting Bio-key Fingerprint Authentication at HIMSS 2014 Compliance Requirements Driving Utilization of Biometric Authentication for ePrescriptions Wall, NJ, Fe

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-02-20 10:47:38
605Computing / Access control / Security / Password / Keio University / User

"keio.jp Terms of Use" Article 1 General The Terms of Use for "keio.jp" (keio dot jp), which is an authentication system that enables users to transverse and use a variety network services, and is administered and operat

Add to Reading List

Source URL: www.skc.itc.keio.ac.jp

Language: English - Date: 2015-04-28 18:40:36
606User / Security / Authorization / Online banking / Access control / Computing / Two-factor authentication / Password

2 Steps to conduct transactions via “CBS Online” Step 1 Open “CBS Online” account at a branch

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-04-09 07:56:19
607Access control / Two-factor authentication / Password / Authentication / Security token / Transaction authentication number / SQL injection / Pass the hash / One-time password / Security / Computer security / Cryptography

How To Count To Two: What “Two Factor Authentication” Misses Eugene Shablygin, Sergey Bratus February 9, Double, Double Toil and Trouble The Bard

Add to Reading List

Source URL: www.wwpass.com

Language: English - Date: 2015-02-10 16:05:25
608Cryptography / Password / Identity management systems / Passphrase / Two-factor authentication / OTPW / Password strength / Security / Computer security / Access control

Usable Privacy & Security I - Scribe Notes

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-20 19:47:30
609McAfee / Security token / One-time password / Two-factor authentication / Single sign-on / Password / Authentication / McAfee VirusScan / Password manager / Security / Computer security / Access control

Data Sheet McAfee One Time Password Two-factor authentication for secure login

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-11-20 19:51:55
610Cryptography / Password / Identity management systems / Transaction authentication number / Password policy / Password cracking / Security / Computer security / Access control

LOGIN SERVICE SECURITY Rachel Engel – rachel[at]isecpartners[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020 San Francisco, Cahttps://www.isecpartners.com

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2014-01-02 06:52:58
UPDATE