Access token

Results: 765



#Item
751Multi-factor authentication / Two-factor authentication / Security token / Authentication / Password / One-time password / Mutual authentication / Online banking / Information security / Security / Access control / Computer security

PDF Document

Add to Reading List

Source URL: www.ffiec.gov

Language: English - Date: 2005-10-07 15:29:10
752Computer security / Access control / Axalto / Smart card / Security token / Two-factor authentication / Digital security / Software protection dongle / Smart cards / Gemalto / Security

PDF Document

Add to Reading List

Source URL: www.gemalto.com

Language: English - Date: 2008-09-25 11:14:30
753Computer network security / Ubiquitous computing / Password / Digital rights management / Authentication / Man-in-the-middle attack / Computer security / Two-factor authentication / Security token / Security / Access control / Identity management

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-08-21 16:21:29
754Event loop / Asynchrony / Inter-process communication / Enterprise JavaBeans / Proactor pattern / Computing / Egton Medical Information Systems / Access token

PDF Document

Add to Reading List

Source URL: www1.cse.wustl.edu

Language: English - Date: 1999-11-29 09:08:19
755Electronics / Device Keys / Media Key Block / AACS LA / Blu-ray Disc / Image Constraint Token / Compliance and Robustness / BackupHDDVD / Advanced Access Content System / Cryptography / Digital rights management

PDF Document

Add to Reading List

Source URL: www.aacsla.com

Language: English - Date: 2012-01-24 04:30:43
756Electronics / Device Keys / Media Key Block / AACS LA / Blu-ray Disc / Image Constraint Token / Compliance and Robustness / BackupHDDVD / Advanced Access Content System / Cryptography / Digital rights management

PDF Document

Add to Reading List

Source URL: www.aacsla.com

Language: English - Date: 2010-03-12 04:31:10
757Logical Link Control / MAC address / Media Access Control / IEEE 802 / IEEE standards / Data link layer / Token ring / Octet / Communications protocol / Network architecture / Computing / OSI protocols

PDF Document

Add to Reading List

Source URL: standards.ieee.org

Language: English - Date: 2010-10-07 17:12:20
758Federated identity / Identity management / Identity management systems / WS-Trust / Web services / WS-Security / Security token / Access token / WS-Federation / Computer security / Security / Computing

PDF Document

Add to Reading List

Source URL: specs.xmlsoap.org

Language: English - Date: 2005-02-25 17:56:19
759Philosophy of psychology / Behavior / Token economy / Response Cost / Reinforcement / Applied behavior analysis / Alan E. Kazdin / Token / Access token / Behaviorism / Behavior modification / Psychology

PDF Document

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
760Identity management / Electronic authentication / Two-factor authentication / Federated identity / Security token / Authentication / Access token / Information security / One-time password / Security / Cryptography / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-12 14:43:17
UPDATE