Access token

Results: 765



#Item
391Password / Token / Access token / Security / Computer security / Login

How-to activate your 4U access token: In order to be able to activate your 4U token on booksandjournals.brillonline.com you need to be registered as a personal user first. If you do not have a personal account yet, pleas

Add to Reading List

Source URL: booksandjournals.brillonline.com

Language: English - Date: 2013-09-05 09:12:37
392Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2013-11-10 10:40:37
393Identity management / Federated identity / Access control / Authentication / Notary / Packaging / Security token / Electronic authentication / Digital identity / Security / Cryptography / Computer security

Authentication in CMS Systems

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2014-04-30 11:23:36
394Cloud storage / Cloud infrastructure / Rackspace Cloud / Cloud API / Security token / Authentication / Access token / Multi-factor authentication / Identity management / Computing / Cloud computing / Security

Cloud Identity Client Developer Guide

Add to Reading List

Source URL: docs.rackspace.com

Language: English - Date: 2014-11-18 21:37:50
395Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2014-10-30 12:02:31
396Desktop publishing software / Digital typography / Donald Knuth / TeX / Typesetting / Tokenization / Lexical analysis / C preprocessor / Access token / Computing / Software / Macro programming languages

dowith.sty — Apply Command to Each Item in a List of Arguments in “TEX’s Gullet”∗ Uwe L¨ uck†

Add to Reading List

Source URL: mirrors.ucr.ac.cr

Language: English - Date: 2012-11-27 14:26:02
397Authentication / Notary / Packaging / IPhone / Security token / Security / Apple Inc. / Access control

D I G I T AL S O L U T I O N S F O R P R O D U C T A U T H E N T I C AT I O N Media Invitation FOR IMMEDIATE RELEASE Contact: Ms. Jennifer Yribar

Add to Reading List

Source URL: www.alpvision.com

Language: English - Date: 2013-04-16 07:43:58
398Data security / Password / Security token / Authentication / Information security / Network Caller ID / User / Security / Computer security / Access control

Microsoft Word[removed]NCID Service.doc

Add to Reading List

Source URL: www.its.nc.gov

Language: English - Date: 2011-02-10 15:01:48
399Federated identity / Identity management / Identity management systems / WS-Trust / Web services / WS-Security / Security token / Access token / WS-Federation / Computer security / Security / Computing

Web Services Trust Language (WS-Trust) February 2005 Authors Steve Anderson, OpenNetwork Jeff Bohren, OpenNetwork Toufic Boubez, Layer 7

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-07-15 03:30:01
400Exonumia / Casino token / Computer security / Token coin / Access token / Security token / Gambling / Entertainment / Gaming

Microsoft Word - PressRelease.doc

Add to Reading List

Source URL: www.alpvision.com

Language: English - Date: 2007-08-15 10:04:29
UPDATE