Access token

Results: 765



#Item
221Cryptographic software / Electronic commerce / PKCS / Microsoft CryptoAPI / X.509 / S/MIME / Security token / RSA / Smart card / Cryptography / Public-key cryptography / Cryptography standards

CSPid is a virtual smartcard that maintains a central repository for X.509 certificates and private keys. It provides a secure environment for cryptographic operations that applications may access via Java, PKCS#11, or M

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2009-11-06 16:00:30
222McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
223McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
224McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
225McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
226IEEE 802 / Local area networks / Network topology / IEEE standards / Media Access Control / Ring network / Token bus network / Token ring / MAC address / Network architecture / OSI protocols / Computing

ROBUST TOKEN MANAGEMENT FOR UNRELIABLE NETWORKS Eric E. Johnson*, Zibin Tang*, Manikanden Balakrishnan*, Juan Rubio*, Huiyan Zhang, and Srugun Sreepuram New Mexico State University Las Cruces, NM ABSTRACT* Token passing

Add to Reading List

Source URL: tracebase.nmsu.edu

Language: English - Date: 2003-07-17 19:51:31
227McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
228Two-factor authentication / RADIUS / Single sign-on / Access token / One-time password / Security / Computer security / Access control

FOAS Scheme     

Add to Reading List

Source URL: www.rs-computer.com

Language: English - Date: 2011-08-22 15:04:17
229McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
230Computer security / Two-factor authentication / Internet standards / HOTP / Access token / RADIUS / Security token / Internet protocols / Computing / Security

Authentication DigiSAFE Authentication Server - DAS Features and Benefits

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 02:09:28
UPDATE