Access token

Results: 765



#Item
111Electronic engineering / Internet / RADIUS / Videotelephony / Network access server / Access token / H.323 / Authentication / Internet protocols / Computing / Internet standards

PortaSwitch: External System Interfaces Guide MR45

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2015-01-23 05:56:49
112HTTP cookie / Internet privacy / Session ID / Session / Computer security / Network architecture / Access token / Security token / Load balancing / Network protocols / Computing / HTTP

Hacking Web Applications Using Cookie Poisoning Amit Klein () is security group manager for Sanctum, Inc. Summary Cookie poisoning is a known technique mainly for achieving impersonation and brea

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:05:36
113Security token / One-time password / Two-factor authentication / EAuthentication / Password / Software token / Authentication / Phishing / Password manager / Security / Computer security / Access control

eAuthentication today, Arnnei Speiser, Mega AS Consulting Ltd, July 2006

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2008-09-21 15:42:07
114Security token / Two-factor authentication / Password / Transaction authentication number / Multi-factor authentication / SMS / Authentication / Phishing / Access token / Security / Computer security / Access control

Whitepaper MODERN THREATS DRIVE DEMAND FOR

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-07-14 19:32:15
115Access token / Computer security

MigratoryData Extension API Developer’s Guide and Reference Manual July 2, 2014 2

Add to Reading List

Source URL: migratorydata.com

Language: English - Date: 2014-07-02 10:02:39
116Business / Embedded systems / Security token / Online banking / Transaction authentication number / Automated teller machine / Password / Authentication / Two-factor authentication / Payment systems / Technology / Security

PIN and Pass Code Security To guard against unauthorised electronic transactions, whether via the use of access cards, such as Visa or Redicards and a PIN, or through phone and internet banking services where a Pass Code

Add to Reading List

Source URL: www.qtmb.com.au

Language: English - Date: 2014-12-18 19:45:45
117Access control / Authentication / Notary / Packaging / Password / Security token / Speaker recognition / Fingerprint / Keystroke dynamics / Security / Biometrics / Identification

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:48
118McAfee / One-time password / Password / Security token / Two-factor authentication / Authentication / Password manager / McAfee VirusScan / Security / Computer security / Access control

Data Sheet McAfee Secures Juniper Networks Features Added security

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:02
119Kerberos / Access token / Computer security / OpenAFS / Cyberwarfare / Network file systems / Computing / Computer network security

Khimaira Identity Management Framework

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2006-01-06 01:24:50
120Identity management / Cryptography / Password / One-time password / Security token / Salt / Phishing / Password strength / Password policy / Security / Computer security / Access control

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version) Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith Dartmouth Computer Science Technical Report TR2008-63

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:12
UPDATE