Access token

Results: 765



#Item
671Notary / Packaging / Password / Computer security / Two-factor authentication / Security token / Security / Access control / Authentication

    Moving Beyond Passwords: Consumer Attitudes  

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2013-04-17 12:02:42
672Identity management / Electronic authentication / Federated identity / Two-factor authentication / Security token / Authentication / Password / Access token / One-time password / Security / Computer security / Access control

NIST Special Publication[removed]

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2011-01-06 14:07:16
673ITunes / IPhone / Smartphones / IOS / Multi-touch / Security token / IPad / ICloud / App Store / Software / Apple Inc. / Computing

Deploying iPhone and iPad Security Overview iOS, the operating system at the core of iPhone and iPad, is built upon layers of security. This enables iPhone and iPad to securely access corporate services and protect impor

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-10-22 01:02:34
674Cryptography standards / Computer network security / Communications Security Establishment Canada / Department of National Defence / FIPS 140-2 / Authentication / Security token / Access token / CSEC / Security / Computer security / Cryptography

UNCLASSIFIED Information Technology Security Guideline User Authentication Guidance for IT Systems

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2012-09-04 13:40:09
675Access control / Authentication / Notary / Packaging / Security token / Public key infrastructure / Cryptography standards / Two-factor authentication / Cryptography / Cryptographic protocols / Key management

FIPS 196, Entity Authenication Using Public Key Cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-25 22:52:41
676Computer law / Two-factor authentication / Password / Multi-factor authentication / Authentication / Information security / Online banking / Security token / Password manager / Security / Cryptography / Access control

Microsoft Word - Authentication12accepted.doc

Add to Reading List

Source URL: www.ffiec.gov

Language: English - Date: 2001-08-07 17:51:24
677Access control / Identity / Federated identity / Electronic authentication / Security token / Authentication / Identity assurance / Anakam / Identity management / Security / Computer security

Draft NISTIR 8014, Considerations for Identity Management in Public Safety Mobile Networks

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-15 22:04:44
678Computer security / Authentication / Notary / Packaging / Password / Security token / Password manager / Two-factor authentication / Security / Access control / Identity management

Application Security Procedure

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2013-04-02 08:12:55
679Identity management / Two-factor authentication / Security token / Password / Authentication / Laptop / Software token / Security / Computer security / Access control

USDA OCT 1 0 ~:lted States Department of Agriculture

Add to Reading List

Source URL: www.ocio.usda.gov

Language: English - Date: 2012-11-29 15:49:52
680Internet protocols / Internet standards / Identity management / Security token / Two-factor authentication / One-time password / Revocation list / Lightweight Directory Access Protocol / Identity management system / Cryptography / Public-key cryptography / Key management

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: www.planc.biz

Language: English - Date: 2011-01-27 05:18:57
UPDATE