Access token

Results: 765



#Item
361Authentication / Login / Transaction authentication number / Password / Security token / SecurID / Security / Computer security / Access token

Formal specification and verification of control software for cryptographic equipment - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-18 20:05:29
362SecurID / Security / Token / Access token / Computer security / Security token / One-time password / Railway signalling / Advanced Encryption Standard / EMC Corporation

How to Use Your Entrust Token

Add to Reading List

Source URL: www.washington.edu

Language: English - Date: 2014-11-06 12:38:18
363Access control / Two-factor authentication / Security token / Electronic authentication / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

DOC Document

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-03 16:02:08
364SCIP / Security / Access token / Defense Security Cooperation Agency / Computer security / Secure Communications Interoperability Protocol / Advanced Encryption Standard / EMC Corporation / SecurID

DEFENSE SECURITY COOPERATION AGENCY 201 12m STREET SOUTH, STE 203 ARLINGTON, VA[removed]OCT[removed]MEMORANDUM FOR DEPUTY ASSISTANT SECRETARY OF THE ARMY FOR

Add to Reading List

Source URL: www.samm.dsca.mil

Language: English - Date: 2014-10-23 13:06:33
365OAuth / Network protocols / Access token / Cross-site request forgery / Session / Internet standards / Security token / RADIUS / Computing / Internet protocols / Cloud standards

RFC[removed]OAuth 2.0 Threat Model and Security Considerations

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-10-05 22:42:14
366Access control / Identity assurance / Two-factor authentication / Credential Service Provider / Security token / Authentication / Electronic authentication / Credential / Information security / Security / Identity management / Computer security

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-03 16:02:04
367Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Security token / Authentication / Fido / OpenID / Transport Layer Security / Security / Computing / Access control

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:13:20
368Identity management / Two-factor authentication / Security token / Multi-factor authentication / One-time password / Mutual authentication / Authentication / Password / Strong authentication / Security / Access control / Internet protocols

Duo Security Flexible Two-Factor Authentication Your users are under attack

Add to Reading List

Source URL: www.duosecurity.com

Language: English - Date: 2014-01-09 16:52:59
369Authenticator / Two-factor authentication / Security token / Authentication / HTML / Security / Access control / Computing

PDF Document

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-10-20 18:07:25
370Computer network security / Access control / Security token / Authentication / Entrust / Man-in-the-browser / Extranet / Password / Strong authentication / Security / Computer security / Computing

READER TRUST AWARD BEST MULTIFACTOR PRODUCT WINNER Entrust for Entrust IdentityGuard

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:47:13
UPDATE