Access token

Results: 765



#Item
81Computer access control / Security token / Access token / Token / Password / Pseudonymity / Authentication / Blind signature

FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2011-08-18 16:53:40
82Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-12-16 18:40:43
83Cryptography / Password / One-time password / IPhone / Software token / Security token / Two-factor authentication / Security / Access control / Computer security

User Guide Soft Token on your mobile Page 1 of 7 FransiKey

Add to Reading List

Source URL: www.alfransi.com.sa

Language: English - Date: 2014-04-16 04:49:09
84Password / One-time password / Login / Cryptography / Password manager / Two-factor authentication / Security / Access control / Computer security

User Guide Hard Token Page 1 of 3 FransiKey

Add to Reading List

Source URL: www.alfransi.com.sa

Language: English - Date: 2014-04-16 04:48:58
85Data / Law / URI schemes / Uniform resource identifier / Access token / Object identifier / Citation / Case citation / Information / Identifiers / Reference

Practical Citation in a World of Evolving Data 23 March 2007 John Kunze, California Digital Library Why cite?

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2007-03-27 16:45:34
86Federated identity / Single sign-on / HTTP cookie / Access token / Central Authentication Service / Identity management / Computer security / System software / Computing

Implementation Guide Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

Add to Reading List

Source URL: enterprise.waywire.com

Language: English - Date: 2015-03-16 15:20:36
87Tokens / Software / Desktop publishing software / Donald Knuth / TeX / Typesetting / Macro / Access token / Token coin / Computing / Macro programming languages / System software

Marcin Woliński Multiple expansions triggered with a single \expandafter This pearl (coded on October 18, 1996) is the most useless one I could think of. Nonetheless it is an example of a really curious expansion of mac

Add to Reading List

Source URL: www.gust.org.pl

Language: English - Date: 2010-02-01 09:49:46
88Data / IEEE standards / Data transmission / Ethernet / Token ring / Time division multiple access / Contention / Network packet / Telecommunication / Information / Media Access Control / Computing

A TYPICAL local a k a network (LAN)todayhasthe following characteristics: Transmits bits serially rather than in parallel.

Add to Reading List

Source URL: www.signallake.com

Language: English - Date: 2013-03-16 17:12:40
89Macro programming languages / Data modeling / Infographics / Table / LaTeX / TeX / Access token / Application software / Computing / Typography

A new implementation of LATEX’s tabular and array environment∗ David Carlisle† Frank Mittelbach

Add to Reading List

Source URL: mirror.unl.edu

Language: English - Date: 2015-04-12 16:30:12
90Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David CarlisleThis file is maintained by the LATEX Project team. Bug reports can be opened (category tools) at http://latex-project.org/bugs.html.

Add to Reading List

Source URL: mirror.math.ku.edu

Language: English - Date: 2015-04-12 16:30:12
UPDATE