Anakam

Results: 61



#Item
1Password / SMS / Phishing / Multi-factor authentication / Authentication / Security Support Provider Interface / Anakam / Security / Technology / Two-factor authentication

CASE STUDY: HEALTH CARE THE BASELLAND CANTONALHOSPITAL IN SWITZERLAND USES MULTI-FACTOR AUTHENTICATION TO PROTECT SENSITIVE PATIENT AND RESEARCH DATA. The Kantonsspital Baselland (Baselland cantonal hospital – KSBL)

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2015-05-18 03:07:12
2Data security / Symantec / Nortel / Verisign / ActivIdentity / Information security / Electronic business / CA Technologies / Anakam / Computing / Technology / Business

eSecure Systems LLC Data as of    Summary

Add to Reading List

Source URL: www.equitynet.com

Language: English - Date: 2014-05-09 11:03:37
3Data security / Symantec / Nortel / Information security / ActivIdentity / Verisign / Electronic business / Anakam / Two-factor authentication / Computing / Security / Business

eSecure Systems, LLC Data as of    Business Analysis

Add to Reading List

Source URL: www.equitynet.com

Language: English - Date: 2015-06-24 18:29:03
4Security / Federated identity / Telecommunications / Federated identity management / Cloud computing / Single sign-on / Provisioning / Web Access Management / Anakam / Computer security / Identity management / System software

People-Focused Access Management Software Consulting Support Services

Add to Reading List

Source URL: pirean.com

Language: English - Date: 2014-08-15 11:57:37
5Computer security / Identity management / Software as a service / Provisioning / Service-oriented architecture / Cloud computing security / Anakam / Computing / Cloud computing / Centralized computing

identity as the new perimeter: securely embracing cloud, mobile and social media

Add to Reading List

Source URL: www.itworldcanada.com

Language: English - Date: 2014-10-14 11:25:43
6Identity management / Identity management systems / Computer network security / Password / Cloud computing security / Security Assertion Markup Language / Cloud computing / Phishing / Anakam / Security / Computing / Computer security

Whitepaper The Next Generation of Cloud Security: Best Practices for Fending off Hackers

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-07-14 19:31:45
7User interface techniques / Access control / Authentication / Notary / Packaging / Mobile banking / Interactive voice response / Two-factor authentication / Anakam / Security / Technology / Electronic commerce

PDF Document

Add to Reading List

Source URL: www.easysol.net

Language: English - Date: 2014-12-19 10:55:29
8Password / Authentication / Man-in-the-middle attack / Strong authentication / Cryptographic protocols / Two-factor authentication / Anakam / Cryptography / Security / Computer security

Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2010-08-18 04:12:00
9Computer network security / Password / Authentication / Identity management / Two-factor authentication / Anakam / Security / Computer security / Cryptography

Microsoft Word - soups2013_extendedabstract_NM_cameraready.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
10Text messaging / Monash University / Password / Wireless / Electronic commerce / Medical informatics / Anakam / Technology / Mobile technology / SMS

CASE STUDY: HEALTHCARE ∏ MONASH HEALTH RELIES ON SMS PASSCODE FOR SECURE REMOTE ACCESS

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-02-27 12:25:43
UPDATE