Access key

Results: 1959



#Item
161Cryptography / Computer security / Security / E-commerce / Identity management / Computer access control / Amsterdam-Oost / Security Assertion Markup Language / Nikhef / PERMIS / Public key certificate / Password

AARC-SA1 CILogon pilot: user certificates behind the scenes Mischa Sall´e Tamas Balogh David Groep

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 04:07:21
162Display technology / Programmable calculators / Liquid crystal displays

LS-LC-30D/35D FIRE SAFE USER MANUAL STEP 1 – OPENING THE SAFE: 1. PRESS THE START KEY. THE LCD DISPLAY WILL SHOW “--------“. 2. ENTER THE ACCESS CODE. (Default code is: “”) 3. PRESS THE START KEY, AND TH

Add to Reading List

Source URL: www.lockstate.com

Language: English - Date: 2015-04-16 14:15:42
163Cryptography / Key management / Public key infrastructure / Reputation management / Identity management / Computer access control / Web of trust / Authentication / Trust / Public key certificate / Blockchain / Internet privacy

Rebranding the Web of Trust A White Paper from Rebooting the Web of Trust by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
164

A HMTT: A Hybrid Hardware/Software Tracing System for Bridging the DRAM Access Trace’s Semantic Gap Yongbing Huang, Licheng Chen, Zehan Cui, State Key Laboratory of Computer Architecture, Institute of Computing Technol

Add to Reading List

Source URL: asg.ict.ac.cn

Language: English - Date: 2014-01-01 21:38:40
    165Open access / Academia / Publishing / Strategic management / Academic publishing / Benchmarking / Research Councils UK / EuroCRIS / Knowledge

    How CRISs are key to the future of research libraries INCONECSSApril 2016 Berlin Anna Clements, Assistant Director (Digital Research) University Library, University of St Andrews @annakclements Executive Board mem

    Add to Reading List

    Source URL: www.inconecss.eu

    Language: English - Date: 2016-04-28 01:37:50
    166

    Customer FAQ What is a sandbox key and how do I get one? The sandbox key gives you access to the D&B Direct sandbox environment to test the API. The sandbox environment provides users with limited access to the D&B Dire

    Add to Reading List

    Source URL: developer.dnb.com

    Language: English - Date: 2015-08-26 00:03:06
      167Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

      FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-02-08 14:24:54
      168

      BITS/ABA KEY CONSIDERATIONS FOR RESPONDING TO UNAUTHORIZED ACCESS TO SENSITIVE CUSTOMER INFORMATION A PUBLICATION OF BITS

      Add to Reading List

      Source URL: fsroundtable.org

      Language: English - Date: 2015-05-20 12:29:10
        169

        A comprehensive suite of reports that provide a holistic understanding of category performance and key drivers Key Benefits Quick Understanding to Category Performance  Immediate access to a suite of pre-formatted cat

        Add to Reading List

        Source URL: www.iriaztec.ca

        Language: English - Date: 2014-11-21 11:58:34
          170Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

          Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          Language: English - Date: 2016-05-17 22:04:37
          UPDATE