Access Authentication

Results: 2034



#Item
961Security token / SecurID / Two-factor authentication / Software token / Authentication / Access token / Password / Provisioning / Identity management / Security / Computer security / Access control

Two Factor Authentication for your smartphone Software Tokens Key benefits

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-08 06:50:04
962EMC Corporation / Advanced Encryption Standard / SecurID / Personal identification number / Password / Authentication / Transaction authentication number / Access token / Identity management / Cryptography / Security / Computer security

The Secure Authentication Service Welcome Guide for RSA SecurID from Signify users www.signify.net

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-05-09 07:37:43
963EMC Corporation / Advanced Encryption Standard / SecurID / Two-factor authentication / Software token / Password / Access token / Identity management / Authentication / Cryptography / Security / Computer security

Token Based Authentication as a Fully Hosted Service Key benefits Reliable •

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2012-11-07 11:09:46
964Security / OAuth / HTTP / Identity management / Access token / Authorization / Basic access authentication / SAML 2.0 / Security Assertion Markup Language / Computing / Computer security / Internet protocols

draft-ietf-oauth-v2-12 - The OAuth 2.0 Authorization Framework

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-01-11 14:21:43
965Identity management / Cryptographic software / Federated identity / Cryptography / Password / OTPW / Single sign-on / Two-factor authentication / One-time password / Security / Computer security / Access control

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes∗ Joseph Bonneau University of Cambridge Cambridge, UK [removed]

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-21 16:41:40
966Security token / One-time password / Password / Authentication / Cryptography / Password manager / Two-factor authentication / Security / Computer security / Access control

Password Less Authentication (PLA) Srikar Sagi

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-30 09:40:52
967Authentication / Notary / Packaging / OWASP / Cryptographic protocols / Security / Computer security / Access control

SECURING MOBILE APPLICATIONS Ulf Larson Göteborg [removed] Thursday, September 13, 12

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-09-13 15:14:23
968Surveillance / Identification / Fingerprints / Access control / Biometric passport / Facial recognition system / Authentication / Identity document / NEC / Security / National security / Biometrics

Integrated Security Solutions http://www.nec.com/security/ 101025_iss_brochure_v08_japan_G.indd 1

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-07-29 04:12:31
969Post Office Protocol / STARTTLS / Simple Mail Transfer Protocol / SMTP Authentication / Message transfer agent / Webmail / Port / Email / Computer-mediated communication / Computing

Important facts in a nutshell regarding your account Your user name A user name (e.g., "mueller") will be assigned to you when you activate your account. You will need it to access the university network. If you have for

Add to Reading List

Source URL: portal-o.hm.edu

Language: English - Date: 2013-11-24 16:12:22
970Authentication / Notary / Packaging / Transaction authentication number / Password / Two-factor authentication / Online banking / Security / Computer security / Access control

HK37 Investment Product Guide - Client Acknowledge

Add to Reading List

Source URL: www.jsafrasarasin.ch

Language: English - Date: 2014-11-05 04:56:05
UPDATE