Access time

Results: 2452



#Item
161Access control / Computer access control / Crime prevention / Cryptography / National security / Authentication / Computer security

How do I log on to HSBCnet using my Security Device? QUICK GUIDE Use the steps outlined in this guide to log on to HSBCnet using your Security Device. Note: If you are using your Security Device for the first time, you

Add to Reading List

Source URL: www.hsbcnet.co.uk

Language: English - Date: 2012-08-06 17:09:10
162

New Journal of Physics The open–access journal for physics Dynamics revealed by correlations of time-distributed weak measurements of a single spin R-B Liu1,4 , S-H Fung1 , H-K Fung1 , A N Korotkov2 and L J Sham3

Add to Reading List

Source URL: www.ee.ucr.edu

Language: English - Date: 2010-01-19 22:03:18
    163Computer access control / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / LastPass / Dropbox / CCID / Gmail / Authentication / Password

    YubiKey Edge and YubiKey Edge-n • YubiKey Edge and YubiKey Edge-n offer strong authentication via Yubico one-time passwords (OTP) and FIDO Universal 2nd Factor (U2F) with a simple tap or touch of a button

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-02-04 14:54:46
    164Computer access control / Cryptography / Computer security / Computing / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / LastPass / Time-based One-time Password Algorithm / One-time password / Password manager / CCID

    YubiKey Standard and YubiKey Nano • YubiKey Standard and YubiKey Nano offer strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button • Works instantly with no need to re-type p

    Add to Reading List

    Source URL: www.yubico.com

    Language: English
    165

    JOURNAL OF COMPUTER AND SYSTEM SCIENCES 7, Time Bounded Random Access Machines STEPHEN A . COOK AND ROBERT A . RECKHOW Department of Computer Science, University of Toronto, Toronto, M S S 1A7, Ontario

    Add to Reading List

    Source URL: www.cs.utoronto.ca

    Language: English - Date: 2010-08-22 18:04:17
      166Artificial intelligence / Computational neuroscience / Futurology / Technology / Time / Future / Singularitarianism / Philosophy of artificial intelligence / Superintelligence / Artificial general intelligence / Strong AI / Ai

      The Data You Have... Tomorrow’s Information Business Marjorie M.K. Hlava President Access Innovations, Inc

      Add to Reading List

      Source URL: nfais.memberclicks.net

      Language: English - Date: 2016-03-02 10:10:42
      167

      Legic® Cards / Keyfobs Utilization possibilities Not only as single utilization but also for multiple applications, can also be utilized for example for access control, time recording, parking, sales

      Add to Reading List

      Source URL: www.fiscard.de

      Language: English - Date: 2012-02-20 05:26:27
        168

        Helideck Monitoring System • Helideck Motion and meteorological data in real time • Easy to read graphical interface for safe helicopter operations • Remote access via web client interface

        Add to Reading List

        Source URL: www.shipmotion.eu

        Language: English - Date: 2016-04-08 11:53:48
          169

          Live access to the real-time information you need to make essential decisions Simultaneous communication with multiple radio platforms from one source

          Add to Reading List

          Source URL: www.safemobile.com

          Language: English - Date: 2015-11-17 13:17:01
            170

            NOTICE OF PRIVACY PRACTICES Effective Date: June 1, 2015 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN ACCESS SUCH INFORMATION. PLEASE REVIEW IT CAREFULLY. Each time yo

            Add to Reading List

            Source URL: cdn.baptistjax.com

            Language: English - Date: 2016-04-04 11:52:06
              UPDATE