Access token

Results: 765



#Item
471Desktop publishing software / Digital typography / Donald Knuth / TeX / Typesetting / Tokenization / Lexical analysis / C preprocessor / Access token / Computing / Software / Macro programming languages

dowith.sty — Apply Command to Each Item in a List of Arguments in “TEX’s Gullet”∗ Uwe L¨ uck†

Add to Reading List

Source URL: mirror.physik-pool.tu-berlin.de

Language: English - Date: 2012-11-27 14:26:02
472SecurID / Government National Mortgage Association / Security / Access token / Economy of the United States / Computer security / Mortgage industry of the United States / Advanced Encryption Standard / EMC Corporation

Modernization Outreach Call: December 12, 2013 1 Agenda

Add to Reading List

Source URL: www.ginniemae.gov

Language: English - Date: 2013-12-18 08:32:59
473Token coin / Access token / Password / Authenticator / Information security / Security token / SecurID / Security / Computer security / Two-factor authentication

Date : January 31, 2011 Reply to Attn of

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2011-11-07 14:00:09
474WS-Security / Security token / SOAP / Internet security / Cryptography / Access token / WS-SecurityPolicy / WS-Trust / Computing / Computer security / Security

1 3 Web Services Security Core Specification

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-09-22 02:14:53
475Computer network security / Password / Authentication / Security token / User / Two-factor authentication / Password manager / Security / Computer security / Access control

Use Your Illusion: Secure Authentication Usable Anywhere Eiji Hayashi Nicolas Christin CMU/CyLab Japan

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-02-11 22:49:55
476Authentication / Notary / Packaging / ISO standards / Ubiquitous computing / Security token / Two-factor authentication / Security / Cryptography / Access control

FIPS[removed]Workshop NIST PIV Team National Institute of Standards and Technology US Department of Commerce Gaithersburg, MD April 18 – 19, 2011

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-04-20 01:00:00
477

***DOD EMALL IS FULLY CAC/PKI ENFORCED*** To log on to DOD EMALL, user must have one of the following: 1. DOD Common Access Card (CAC)/HSPD-12 equivalent 2. External Certificate Authority (ECA) Medium Token If you have n

Add to Reading List

Source URL: www.dscc.dla.mil

- Date: 2013-05-14 10:48:04
    478Multi-factor authentication / Two-factor authentication / Security token / Mutual authentication / Authentication / Online banking / One-time password / Password / Information security / Security / Access control / Computer security

    Microsoft Word - johns authentication fil.doc

    Add to Reading List

    Source URL: entrust.wpengine.netdna-cdn.com

    Language: English - Date: 2013-05-03 16:49:39
    479Broadband / Internet access / National Telecommunications and Information Administration / National Broadband Plan / Public Broadcasting Act / NPR / Public Broadcasting Service / Federal Communications Commission / Television licence / Broadcasting / Corporation for Public Broadcasting / Public broadcasting

    http://fjallfoss.fcc.gov/ecfs/upload/confirm?token=9fvqen2djgox

    Add to Reading List

    Source URL: cpb.org

    Language: English - Date: 2014-01-27 17:11:03
    480Anakam / Two-factor authentication / Multi-factor authentication / Authentication / AKA / Password / Data security / Biometrics / Security token / Security / Access control / Cryptography

    Progressive authentication integrated into Equifax Identity Proofing  R eal time fraud prevention at registration, login, and other transactions.

    Add to Reading List

    Source URL: www.equifax.com

    Language: English - Date: 2013-02-19 11:47:05
    UPDATE