Access token

Results: 765



#Item
61

 SectionQuery domain name details using token addedWhitelist IP addresses for DRS-EPP access moved to Chapter 3 Admin user, in line with the whitelisting functionality being linked to the role of admin

Add to Reading List

Source URL: nic.amsterdam

Language: English
    62Computer access control / Security token / Authentication / Token / Access token / Contract

    TOKEN REQUEST FORM Diamond Bank Plc. RCCustomer Information Type of Account

    Add to Reading List

    Source URL: www.diamondbank.com

    Language: English - Date: 2016-05-26 13:33:00
    63Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

    Best Practices for Privileged User PIV Authentication

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-21 07:36:03
    64Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

    To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:33:42
    65Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

    Yubico Best Practices: OATH-HOTP

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-02-19 11:38:08
    66Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

    FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-02-08 14:24:54
    67Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

    Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 22:04:37
    68Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

    EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

    Add to Reading List

    Source URL: www.ebf-fbe.eu

    Language: English - Date: 2016-02-10 08:34:16
    69Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

    I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:35:58
    70Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

    Public Comments Received on NIST SP: Electronic Authentication Guideline

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English
    UPDATE