Access Authentication

Results: 2034



#Item
741FeliCa / Computing / Near field communication / Microsoft Windows / Windows Vista / Internet Explorer / Technology / Software / Windows NT

USB NFC Reader RC-S330 (PaSoRiTM) is a USB reader, suitable for various applications, such as PC logon, printer access, application authentication, and so on. The reader supports various contactless IC cards,

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-10-09 02:37:30
742Cryptographic protocols / Electronic commerce / Certificate policy / PKCS / X.509 / S/MIME / Windows / Key / Public key certificate / Cryptography / Public-key cryptography / Key management

DAS adds role-based authentication and ‘community of interest’ confidentiality to all X.509-based security-enabled applications OVERVIEW ISC’s Document Access Servlet (DAS) is a customer-hosted web service that per

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2013-07-26 13:46:04
743Disk encryption / Password / Security token / Single sign-on / One-time password / Two-factor authentication / Network security / USB / Password manager / Security / Computer security / Access control

N° and issue date : [removed]2008 Circulation : 13000 Frequency : Monthly ChannelBusiness_80601_55_326.pdf Web Site: www.channelbusiness.com

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2014-05-01 10:03:17
744Computer network security / Data security / Crime prevention / National security / Information security / Password / Access control / Security controls / Authentication / Security / Computer security / Cyberwarfare

< PAGE >1 UNSW IT Security Standards & Guidelines

Add to Reading List

Source URL: www.it.unsw.edu.au

Language: English - Date: 2010-04-07 20:19:51
745Notary / Packaging / International Hologram Manufacturers Association / Counterfeit / Law / Security / Access control / Authentication

AUTHENTICATION SOLUTION PROVIDERS’ ASSOCIATION COMMEMORATES 16 YEARS OF PROTECTING BRANDS WORLDWIDE ~ ASPA Reviews and Inducts Four New Members in its efforts to fight counterfeits ~

Add to Reading List

Source URL: aspaglobal.com

Language: English - Date: 2014-12-08 05:01:00
746Cryptographic protocols / HTTP / Internet protocols / Internet standards / Basic access authentication / Cryptographic nonce / Challenge-response authentication / Transport Layer Security / One-time password / Computing / Security / Data

Internet Engineering Task Force (IETF) Request for Comments: 7486 Category: Experimental ISSN: [removed]S. Farrell

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-03-10 20:46:32
747McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
748Information / Internet Key Exchange / IPsec / Internet Security Association and Key Management Protocol / Security association / Oakley protocol / Internet security / Extensible Authentication Protocol / NAT traversal / Cryptographic protocols / Cryptography / Data

Fusion Embedded™ IKE Fusion Internet Key Exchange is an Internet Protocol security (IPsec) standard protocol used to ensure security for VPN negotiation and remote host or network access. It provides an automatic means

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:49:14
749McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
750Technology / Data / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Authenticator / Supplicant / Wired Equivalent Privacy / Wireless access point / Computer network security / Computing / Wireless networking

I N D U S T R Y T R E N D S Will IEEE 802.1X Finally Take Off in 2008? Neal Leavitt

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:45:56
UPDATE