Access token

Results: 765



#Item
301Two-factor authentication / Security token / Password / Authentication / Multi-factor authentication / Software token / Anakam / Password manager / Security / Access control / Computer security

A GUIDE TO PHONE-BASED PASSWORD PROTECTION (SAMPLE CODE INCLUDED) The increasing frequency of password breaches, along with other forms of cyber attack, make strong

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-04-22 19:57:52
302Internet protocols / Two-factor authentication / Security token / One-time password / Single sign-on / Multi-factor authentication / Password / Authentication / Identity management / Security / Computer security / Access control

A UBM TECHWEB WHITE PAPER AUGUST 2012 Software-Based Authentication Delivers More Reliable and Less Costly Security With the adoption of mobility and cloud computing, coupled

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2013-01-16 18:01:47
303Computer security / Cyberwarfare / Session fixation / HTTP cookie / Session ID / Session / Access token / HTTP Secure / HTTP / Computing / Network protocols

Improving the Security of Session Management in Web Applications Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:39:44
304Two-factor authentication / Security token / One-time password / Authentication / Password / Java Platform /  Enterprise Edition / QR code / Software token / Mobile ticketing / Security / Computer security / Access control

www.ti8m.ch Zürich | Bern ti&m product flyer ti&m secure web

Add to Reading List

Source URL: www.ti8m.ch

Language: English - Date: 2014-08-18 05:04:43
305Computer network security / Two-factor authentication / Password manager / Security token / Password / One-time password / SecurID / Authentication / Self-service password reset / Security / Computer security / Access control

User Authentication on Mobile Devices Amit Sethi Technical Manager Omair Manzoor Senior Security Consultant

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:56
306ITunes / IPhone / Smartphones / IOS / Multi-touch / Security token / IPad / ICloud / App Store / Software / Apple Inc. / Computing

Deploying iPhone and iPad Security Overview iOS, the operating system at the core of iPhone and iPad, is built upon layers of security. This enables iPhone and iPad to securely access corporate services and protect impor

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:06:07
307Two-factor authentication / Security token / Authentication / Cryptography / Password manager / Password strength / Security / Access control / Password

Back-of-Device Authentication on Smartphones

Add to Reading List

Source URL: www.medien.ifi.lmu.de

Language: English - Date: 2013-05-06 07:00:20
308Security token / Two-factor authentication / Single sign-on / One-time password / Authentication / Software token / RADIUS / Password / Password manager / Security / Computer security / Access control

Service platforms Authentication Solution Optimized for Smart Devices IKEYA Ryohei, OKADA Hideaki, KOUDA Keito, TEZUKA Yukiko Abstract

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2014-03-26 09:05:05
309Access token / Computer security

MigratoryData Extension API Developer’s Guide and Reference Manual July 2, 2014 2

Add to Reading List

Source URL: migratory.ro

Language: English - Date: 2014-07-02 10:02:39
310JavaScript / JSON / Remote procedure call / Web services / Representational state transfer / Access token / JSONP / JSON-RPC / Computing / Ajax / Software engineering

digitalSTROM Smartphone Apps digitalSTROM Version: master-branch* June 23, 2014

Add to Reading List

Source URL: developer.digitalstrom.org

Language: English - Date: 2014-06-23 05:03:07
UPDATE