Access Authentication

Results: 2034



#Item
721Internet protocols / Security token / One-time password / HOTP / Two-factor authentication / Access token / RADIUS / Citrix Systems / SecurID / Computing / Security / Computer security

Celestix_datasheet_template_hotpin_1

Add to Reading List

Source URL: www.e92plus.com

Language: English - Date: 2014-01-28 09:10:19
722Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA[removed]

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
723Federated identity / Identity management / Computing / Security Assertion Markup Language / SAML 2.0 / SAML 1.1 / Shibboleth / Authentication / Identity provider / Computer security / System software / Identity management systems

UK Access Management Federation for Education and Research Technical Recommendations for Participants Ian A. Young

Add to Reading List

Source URL: www.ukfederation.org.uk

Language: English - Date: 2014-10-13 08:06:49
724Password / Identity management systems / Self-service password reset / Transaction authentication number / Cryptographic software / Password strength / Password manager / Security / Access control / Computer security

How to change your IT account password This guide tells you how you can change your password yourself at any time, at the university or remotely. The guide covers: 

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-01-09 13:00:12
725One-time password / Two-factor authentication / Password / SMS / Electronic commerce / Security token / Password manager / Technology / Security / Access control

Press Release Pretioso and April System Design join forces and bring DynaPass OTP solutions to the German-speaking market as datomo Mobile Password Stockholm, April[removed], The Swedish security software company April Sy

Add to Reading List

Source URL: www.april.se

Language: English - Date: 2010-04-28 12:13:52
726Computing / IEEE 802.11 / Service set / Wireless LAN / Wi-Fi Protected Access / Extensible Authentication Protocol / Wi-Fi / Transmission Control Protocol / Temporal Key Integrity Protocol / Wireless networking / Technology / Cryptography

WiresharkDisplay Filter Field Reference Frame Type/Subtype Management frames Control frames Data frames Association request

Add to Reading List

Source URL: www.willhackforsushi.com

Language: English - Date: 2007-11-05 11:46:25
727Identity management / Advanced Encryption Standard / EMC Corporation / SecurID / Password / Authentication / Transaction authentication number / Phishing / Biometrics / Security / Access control / Cryptography

Next Generation Identity Assurance Dr Basil Philipsz Distributed Management Systems Ltd If Condoms had the same protecting performance as Passwords they would be laughed off as a jokehttp://www.informationisbeautiful.net

Add to Reading List

Source URL: www.casque.co.uk

Language: English - Date: 2014-07-30 05:27:01
728Identity management / Password / Two-factor authentication / Authentication / Security Assertion Markup Language / Password manager / Single sign-on / Security / Access control / Computer security

PDF Document

Add to Reading List

Source URL: www.biscom.com

Language: English - Date: 2015-02-25 11:24:48
729Federated identity / Access control / Authentication / Notary / Packaging / OpenID / Biometrics / Credential / Electronic authentication / Security / Identity management / Identity

TrustX 2.0 Identity-as-a-Service Service Definition Aug 27, 2014 Revision[removed]DCN: 10000

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-28 19:14:52
730Login / Password / Transaction authentication number / Federated identity / Social login / Identity correlation / Security / Access control / Computer security

HOW TO ACCESS THE NEW SYSTEM TO REQUEST GRANTS OR SERVICES

Add to Reading List

Source URL: www.communitymatters.govt.nz

Language: English - Date: 2015-04-16 19:53:30
UPDATE