Access token

Results: 765



#Item
411Fingerprints / Identification / Computer network security / Security token / Authentication / Fingerprint recognition / Fingerprint / Biometrics / Two-factor authentication / Security / Access control / Computer security

NISTIR 7290, Fingerprint Identification and Mobile Handheld Devices: An Overview and Implementation

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:43:05
412Access control / Identity management / Computer security / Identity / Authentication / Authenticator / Identifier / Access token / Copyright law of the United States / Security / Data / Metadata

The Nature of the Digital Persona and Its Implications for Data Protection Law The Nature of the Digital Persona and Its Implications for Data Protection Law Agenda

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2014-01-15 17:48:40
413Access control / Two-factor authentication / Online banking / Mutual authentication / Information security / Authentication / Security token / Layered security / Bank / Security / Computer security / Multi-factor authentication

Attachment to SR 06-13: Questions and Answers Related to Interagency Guidance on

Add to Reading List

Source URL: www.federalreserve.gov

Language: English - Date: 2006-08-29 15:47:52
414Password / Security token / Login / Identity management systems / Self-service password reset / Federated identity / Password fatigue / Security / Access control / Computer security

How to Recover Your Password If you have forgotten your PowerSchool Parent Portal password, you will be unable to log into the PowerSchool Parent Portal. Use this procedure to recover your password. Once you provide your

Add to Reading List

Source URL: chester.schooldesk.net

Language: English - Date: 2011-05-23 08:18:49
415Identification / Fingerprints / Computer network security / Entrust / Security token / Authentication / Password / Authenticator / Biometrics / Security / Computer security / Access control

Diagram-fingerprint authentication

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-02-18 12:15:37
416Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirrors.hust.edu.cn

Language: English - Date: 2014-10-30 12:02:31
417Electronic authentication / Access token / Fido / Revocation list / Authentication / Security / Identity management / Computer security

FIDO U2F Implementation Considerations

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:16
418Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ftp.ctex.org

Language: English - Date: 2014-10-30 12:02:00
419Access control / Two-factor authentication / Online banking / Mutual authentication / Information security / Authentication / Security token / Layered security / Bank / Security / Computer security / Multi-factor authentication

Microsoft Word - faqdoc.doc

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-11-23 08:48:47
420Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-02-13 11:02:58
UPDATE