Access token

Results: 765



#Item
331Computer crimes / Password / Cryptography / Security token / Keystroke logging / Phishing / Password strength / Partial Password / Security / Computer security / Access control

Graphical Passwords: A Survey Xiaoyuan Suo Ying Zhu G. Scott. Owen Department of Computer Science Georgia State University

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2005-11-21 16:34:38
332Internet protocols / HTTP / WebDAV / URI scheme / Privilege / Access control / Access token / Principal / Uniform resource identifier / Computing / Computer security / World Wide Web

Web Distributed Authoring and Versioning (WebDAV) Access Control Protocol

Add to Reading List

Source URL: greenbytes.de

Language: English - Date: 2014-12-29 07:43:52
333Two-factor authentication / Password / Security token / Identity theft / Cryptographic software / Password manager / Security / Access control / Computer security

OneKey Newsletter Issue[removed]Dear Service Providers, Here are this month’s highlights: • The Art of Cyber Defense (8 Jan[removed]participants attended the seminar jointly organised by Assurity and Toppan Form.

Add to Reading List

Source URL: www.assurity.sg

Language: English - Date: 2014-09-15 04:57:10
334SecurID / Access token / Authentication / One-time password / Token / Act / Notary / Law / Notary public

Instructions for completing the Notary Token Verification Form Overview Oak Ridge National Laboratory (ORNL) provides services to many users, projects and programs. ORNL uses one-time password technology using RSA SecurI

Add to Reading List

Source URL: www.olcf.ornl.gov

Language: English - Date: 2013-01-12 16:07:07
335OSI protocols / Network topology / IEEE standards / Computer networking / Local area networks / Fiber Distributed Data Interface / Token ring / Ring network / Cable modem / Ethernet / Computing / Network architecture

Informatics Current issue : January 1999 LAN TECHNOLOGIES Media Access Control methods

Add to Reading List

Source URL: informatics.nic.in

Language: English - Date: 2012-08-30 07:08:25
336Cloud standards / Identity management / Federated identity / OAuth / OpenID / Security token / Access token / Authentication / Security Assertion Markup Language / Security / Computer security / Computing

HIT Standards Committee Transport & Security Standards Workgroup Transcript January 12, 2015

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2015-01-14 11:57:40
337Payment systems / Electronic commerce / Two-factor authentication / Security token / Password / Transaction authentication number / Bank / Login / Authentication / Security / Access control / Computer security

Gate City Bank | Online Business Banking i Table Of Contents Table of Contents Online Business Banking ................................................................................................ 5

Add to Reading List

Source URL: www.gatecitybank.com

Language: English - Date: 2014-01-16 17:54:12
338Internet protocols / Security token / One-time password / Two-factor authentication / Password / ESET / RADIUS / Password manager / ESET NOD32 / Computer security / Security / Access control

Solutions Overview Proven. Trusted. ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2013-02-21 10:15:14
339One-time password / Two-factor authentication / Authentication / Password / Federated identity / Security token / HOTP / Security / Computer security / Access control

YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:57
340Access control list / Access token / Mandatory Integrity Control / Security / Computer security / Access control

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19
UPDATE