Authenticator

Results: 100



#Item
1

FIDO Vendor Self-Assertion Checklist This self-assertion checklist provides information about the security implementation of the authenticator. By filling out this checklist you acknowledge your implementation meets the

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2016-06-17 18:31:48
    2

    Risk-Based Authenticator for Web Applications ROLAND H. STEINEGGER, DANIEL DECKERS, PASCAL GIESSLER, AND SEBASTIAN ABECK, Cooperation & Management, Karlsruhe Institute of Technology (KIT) Web applications for consumers o

    Add to Reading List

    Source URL: cm.tm.kit.edu

    Language: English - Date: 2017-10-11 06:24:35
      3

      How to switch to LastPass Authenticator 1. Open up your browser and go to https://accounts.logme.in (not logmein.com) 2. Log in with your LogMeIn.com or join.me account a. If you have forgotten the password to your LogMe

      Add to Reading List

      Source URL: prod.cdata.app.sprinklr.com

      - Date: 2016-11-14 11:18:49
        4Norbert Pohlmann / Cryptography / Computer access control / Fog Investigation and Dispersal Operation / Gelsenkirchen / Fido / Authenticator / Internet security / Authentication / Cloud computing / Computing / Security

        A New Approach For FIDO UAF  Advantages of a cloud-based FIDO Client Prof. Dr. (TU NN) Norbert Pohlmann

        Add to Reading List

        Source URL: norbert-pohlmann.com

        Language: English - Date: 2016-03-23 13:56:57
        5

        FiTeq Authenticator Performance Benchmark

        Add to Reading List

        Source URL: www.fiteq.com

        Language: English
          6Computer access control / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Security / Authenticator / Derivative test

          Derivative Test Plan Company Name Contact Person Email address: Product / Service Name and Version:

          Add to Reading List

          Source URL: fidoalliance.org

          Language: English - Date: 2016-06-17 18:31:49
          7Computer access control / Cryptography / Computing / Computer security / YubiKey / PrivacyIDEA / OpenPGP card

          YubiKey NEO • Works instantly with no need to re-type passcodes -replacing SMS texts, authenticator apps, RSA tokens, and similar devices Description:

          Add to Reading List

          Source URL: www.yubico.com

          Language: English - Date: 2016-02-04 16:10:41
          8Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

          FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

          Add to Reading List

          Source URL: www.yubico.com

          Language: English - Date: 2016-02-08 14:24:54
          9Computing / Wireless / Technology / Bluetooth / Universal 2nd Factor / FIDO Alliance / Near field communication / Authentication / Authenticator

          Bluetooth & NFC Transport for FIDO U2F July 22, 2015 Executive Summary Universal 2nd Factor (U2F) is a Fast IDentity Online (FIDO) Alliance protocol that lets online applications and services augment the security of the

          Add to Reading List

          Source URL: fidoalliance.org

          Language: English - Date: 2015-08-04 16:08:10
          10Cryptography / Security / Computer security / Computer access control / Authenticator / Nok Nok Labs / Authentication / FIDO Alliance / Fido

          FIDO UAF Authenticator-Specific Module API FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-asm-api-v1.0pshtml Previous versio

          Add to Reading List

          Source URL: fidoalliance.org

          Language: English - Date: 2015-03-30 14:07:07
          UPDATE