Access token

Results: 765



#Item
321Federated identity / Internet standards / Internet protocols / Authorization / Authentication / Identity management / Two-factor authentication / Security token / Lightweight Directory Access Protocol / Security / Computer security / Computing

Microsoft Word - IdentityManagementReference ArchitectureForDesign.doc

Add to Reading List

Source URL: designfest.acm.org

Language: English - Date: 2007-01-15 17:50:22
322Access control / Authentication / Notary / Packaging / Password / Security token / Speaker recognition / Fingerprint / Keystroke dynamics / Security / Biometrics / Identification

Information at all.net[removed]http://all.net/

Add to Reading List

Source URL: www.all.net

Language: English - Date: 2013-07-10 14:09:48
323Computer security / Security / Access control / Password manager / Security token / Password / 9

Information at all.net[removed]http://all.net/

Add to Reading List

Source URL: www.all.net

Language: English - Date: 2013-07-10 14:09:44
324Deathmatch / Frag / Counter / Token coin / Zombies!!! / Windows games / Games / Competitive video gaming / Doom: The Boardgame

GUEST USERS 1. When accessing the CSU Wi-Fi as a “Guest User” your access is restricted to the www. Com (world wide web page) outside of CSU. 2. Guest users simply need to click on the “ACCEPT” button as noted in

Add to Reading List

Source URL: csu.edu

Language: English - Date: 2014-09-17 11:43:01
325Password / Data security / Security token / Information security / Access control / Password policy / Privileged password management / Security / Identity management / Computer security

UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Access Management

Add to Reading List

Source URL: www.utmb.edu

Language: English - Date: 2009-07-09 10:25:18
326Wireless sensor network / NesC / Actor model / Technology / Computing / TinyOS / Access token

Building up to Macroprogramming: An Intermediate Language for Sensor Networks Ryan Newton and Arvind Matt Welsh

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2005-03-15 12:55:47
327Access token / Computer security / Token coin

Online Scenario I: Blood in the Shadows This is the first official online scenario for DOOM: THE BOARDGAME. It is designed to be shorter and play more quickly than those included in the Scenario Guide. It is not intended

Add to Reading List

Source URL: www.fantasyflightgames.com

Language: English - Date: 2012-08-28 19:17:14
328Two-factor authentication / Security token / Authentication / One-time password / Password / Transaction authentication number / Multi-factor authentication / Anakam / Security / Computer security / Access control

Messaging on a mobile phone

Add to Reading List

Source URL: www.oneid.com

Language: English - Date: 2014-05-13 11:04:28
329Federated identity / Password / PowerSchool / Single sign-on / Security token / Security / Access control / Computer security

PowerSchool 7.x Parent Portal User Guide

Add to Reading List

Source URL: www.kimberly.k12.wi.us

Language: English - Date: 2011-08-16 14:10:51
330Access control / Password / Salt / Crypt / Security token / OTPW / Password manager / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, and Blase Ur October

Add to Reading List

Source URL: www.cylab.cmu.edu

Language: English - Date: 2015-01-06 12:41:54
UPDATE