Access token

Results: 765



#Item
171Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
172DEME / Authentication / Access token / Multi-factor authentication / Password / Security / Access control / Two-factor authentication

CASE STUDY: CONSTRUCTION & ENGINEERING Photo:Lars Schmidt DEME REPLACES TOKEN-BASED SOLUTION TO REGAIN CONTROL OF USER AUTHENTICATION

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-02-27 12:33:33
173Computing / Network topology / IEEE 802 / Ethernet / Token ring / Token passing / Channel access method / Network switch / ARCNET / IEEE standards / OSI protocols / Network architecture

An In-Home Digital Network Architecture for Real-Time and Non-Real-Time Communication Hans Scholten, Pierre G. Jansen, Ferdy Hanssen and Tjalling Hattink University of Twente, Department of Computer Science INF 4037, POB

Add to Reading List

Source URL: www.croky.net

Language: English - Date: 2003-07-28 17:15:31
174Network architecture / Ethernet / IEEE 802 / Hidden node problem / Wireless networking / Network switch / Carrier sense multiple access with collision avoidance / Point coordination function / Token ring / IEEE standards / OSI protocols / Computing

1 A Real-Time Multimedia Streaming Protocol for Wireless Networks Hans Scholten, Pierre Jansen, Ferdy Hanssen, Wietse Mank and Arjan Zwikker University of Twente, Department of Computer Science (EEMCS), Enschede, the Ne

Add to Reading List

Source URL: www.croky.net

Language: English - Date: 2003-10-28 08:30:31
175Space Innovation and Development Center / Banks / World Bank / Access token / Email / Loan / Computing / United Nations / Economics / El Paso County /  Colorado

FFICIAL cOUIMENTS The World Bank INTERNATIONAL BANK FOR RECONSTRUCTION AND DEVELOPMENT INTERNATIONAL DEVELOPMENT ASSOCIATION

Add to Reading List

Source URL: www-wds.worldbank.org

Language: English - Date: 2015-05-08 14:35:42
176Computer network security / Internet protocols / Federated identity / Single sign-on / Security token / Secure Shell / Integrated Windows Authentication / Stonesoft Corporation / Virtual private network / Computer security / Computing / Security

a2cloud Solution for secured authentication and access to cloud Whitepaper Combining Modern Authentication Needs

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2013-07-15 09:30:37
177IEEE standards / Computing / Local area networks / Media Access Control / Ethernet / Ring network / Data link layer / Token bus network / Channel access method / Network architecture / IEEE 802 / Network topology

RTnet, a new approach to in-home real-time multimedia communication Hans Scholten, Pierre G. Jansen, Ferdy Hanssen, Tjalling Hattink University of Twente, Dept. of Computer Science, Enschede, the Netherlands E-mail: {sch

Add to Reading List

Source URL: www.croky.net

Language: English - Date: 2003-07-28 17:15:24
178Two-factor authentication / One-time password / Authentication / Credit card / Payment systems / Electronic commerce / Security token / Chip Authentication Program / Security / Access control / Password

4.1 Application Method Primary User (PU) * Delegated User (DU) * Please fill in the “Security Device

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-04-09 07:56:18
179Password / Transaction authentication number / Access token / Trustee Savings Bank / Cyberwarfare / Password manager / Security / Lloyds Banking Group / Security token

BusinessBank Super User/Token User Application Title of Business Token user PLEASE TICK ONE BOX

Add to Reading List

Source URL: www.tsbbank.co.nz

Language: English - Date: 2014-10-12 21:57:02
180Computing / Tokens / Data transmission / Security token / Oblivious transfer / Actor model / Token / Universal composability / Access token / Cryptographic protocols / Data / Information

c IACRThis article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 2013 December 3. The version published by Springer-Verlag is available at . (Efficient) Universally C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-11 22:12:12
UPDATE