Access Authentication

Results: 2034



#Item
631Wireless / Hotspot / Captive portal / Password / Near field communication / Wireless access point / FON / Nintendo Wi-Fi Connection / Devicescape Software / Wi-Fi / Technology / Electronic engineering

Using a 2DST Waveguide for Usable, Physically Constrained Out-of-Band Wi-Fi Authentication

Add to Reading List

Source URL: www.teco.edu

Language: English - Date: 2013-08-12 07:21:52
632Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
633Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
634Computer security / Transaction authentication number / Login / Access control / Security / Password

PROCEDURE TO RESET PASSWORD IN CASE ACCOUNT IS BLOCKED 1. To unblock the account, Assessee can go to www.aces.gov.in ----> Central Excise / Service Tax (as the case may be) ----> ‘Unblock Your Account’:

Add to Reading List

Source URL: www.aces.gov.in

Language: English - Date: 2012-08-30 12:38:58
635DEME / Authentication / Access token / Multi-factor authentication / Password / Security / Access control / Two-factor authentication

CASE STUDY: CONSTRUCTION & ENGINEERING Photo:Lars Schmidt DEME REPLACES TOKEN-BASED SOLUTION TO REGAIN CONTROL OF USER AUTHENTICATION

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-02-27 12:33:33
636Access control / Biometrics / Digital identity / Identity document / Authentication / Interactive kiosk / Identity assurance / Smart card / Identity theft / Security / Identity management / Identity

Microsoft Word - NextgenID_news_WV_homeland_071614

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2014-07-16 23:48:36
637Types of business entity / Security / Access control / Authentication / Packaging / Email / Gesellschaft mit beschränkter Haftung / Civil law notary / Fax / Technology / Law / Notary

If you would like to purchase shares/interest in a shelf company/limited partnership, please complete this form in full and send it to DNotV GmbH. We will reserve the next available company for you after receipt. Prepa

Add to Reading List

Source URL: www.dnotv.de

Language: English - Date: 2014-10-31 03:55:32
638Network architecture / Computer networking / Internet protocols / Network performance / Proxy server / Password / Internet standards / Basic access authentication / Transport Layer Security / Computing / Internet / Internet privacy

perdition: Mail Retrieval Proxy Horms (Simon Horman) Verge Networks – VA Linux Systems Japan, K.K. – January 2003 http://www.verge.net.au/linux/perdition/

Add to Reading List

Source URL: horms.net

Language: English - Date: 2003-01-17 01:46:41
639Computer network security / Internet protocols / Federated identity / Single sign-on / Security token / Secure Shell / Integrated Windows Authentication / Stonesoft Corporation / Virtual private network / Computer security / Computing / Security

a2cloud Solution for secured authentication and access to cloud Whitepaper Combining Modern Authentication Needs

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2013-07-15 09:30:37
640Two-factor authentication / One-time password / Authentication / Credit card / Payment systems / Electronic commerce / Security token / Chip Authentication Program / Security / Access control / Password

4.1 Application Method Primary User (PU) * Delegated User (DU) * Please fill in the “Security Device

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-04-09 07:56:18
UPDATE