Access token

Results: 765



#Item
661Computer security / Access control / Authentication / Notary / Credential Service Provider / Access token / National Institute of Standards and Technology / Electronic authentication / Identity assurance / Security / Federated identity / Identity management

NIST Special Publication[removed]Elaine Newton & Ray Perlner Computer Security Division NIST ITL

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-13 14:50:05
662Grammar / Authentication / Access token / Question / Government / Government of India / Unique Identification Authority of India / Security

Standardization Case Study

Add to Reading List

Source URL: www.standardslearn.org

Language: English - Date: 2014-03-31 09:36:33
663Computer network security / Crime prevention / National security / Security token / Computer security / Authentication / Smart card / Phishing / Password / Security / Access control / Identity management

DEPARTMENT OF COMMERCE NOTICE OF INQUIRY TEMPLATE

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 09:32:12
664Electronics / Consumer electronics / Audio storage / Computer storage media / DVD / Image Constraint Token / HDMI / High-bandwidth Digital Content Protection / Blu-ray Disc / High-definition television / Television / Electronic engineering

COMMENT: Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies Matt Perkins Minneapolis, MN December 2, 2008

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2008-12-03 09:57:42
665One-time password / Multi-factor authentication / Password / Computer network security / Two-factor authentication / Security token / Security / Access control / Computer security

PDF Document

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:51:15
666Advanced Encryption Standard / EMC Corporation / SecurID / Two-factor authentication / Password / Access token / Security token / One-time password / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-03 22:15:27
667Cyberwarfare / Crime prevention / National security / Internet privacy / Password / Telecommunications data retention / Access control / Security token / Confidentiality / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.idph.state.ia.us

Language: English - Date: 2010-05-27 08:54:46
668Authentication / Notary / Packaging / Multi-factor authentication / Federated identity / Two-factor authentication / Security token / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:47:07
669WS-Security / Kerberos / Generic Security Services Application Program Interface / Access token / OASIS / WS-SecurityPolicy / Computing / Computer security / Security

Microsoft Word - wss-v1.1-spec-os-KerberosTokenProfile.doc

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2006-10-12 10:25:58
670Password / Security token / Computer security / Access control / Security / Login

Introduction to the terminal

Add to Reading List

Source URL: old.ecmwf.int

Language: English - Date: 2013-04-05 12:46:39
UPDATE