Authenticator

Results: 100



#Item
31Technology / Google Authenticator / Google Voice / Barcode / IPhone / Android / QR code / IOS / Mobile application development / Smartphones / Computing / Software

Microsoft Word - NEW Appendix L

Add to Reading List

Source URL: www.womensaid.ie

Language: English - Date: 2013-02-22 11:52:25
32Password / Coeus / Login / SWF / Authenticator / Computer security / Computing / Computer network security / Kerberos

Introduction to Coeus Hand out

Add to Reading List

Source URL: www.dartmouth.edu

Language: English - Date: 2014-07-16 12:57:54
33Data / IEEE 802.1X / Information / Internet protocols / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-08-18 19:01:31
34Data / IEEE 802.1X / Internet protocols / Information / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-09-07 12:32:45
35Computer network security / Computer security / Two-man rule / Software protection dongle / IEEE 802.1X / Kerberos / Security / Authenticator / Computing

Remote Auditing of Software Outputs Using a Trusted Coprocessor Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
36Escrow / Real property law / Digital signature / Authentication / Cryptography / Public-key cryptography / Notary

CS255 Programming Project: The Authenticator The project focuses on Anonymous Authentication. Our objective is to enable a person to authenticate himself to a service without revealing his identity. For example, the Wal

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-20 01:28:07
37APP / Abbreviations

TrustX Authenticator Mobile App – for Android Devices Quick Reference Sheet The TrustX Authenticator mobile app is geared towards providing access to transactions, devices and relying parties. Capabilities include: •

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-09-15 11:40:08
38Authenticator / Mobile apps / APP / Computer architecture / Electronics / IEEE 802.1X / Smartphones / Computing / IOS

TrustX Authenticator Mobile App for iOS Devices Quick Reference Sheet The TrustX Authenticator mobile app is geared towards providing access to transactions, devices and relying parties. Capabilities include: • Authent

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-09-15 11:40:18
39Access control / Identity management / Computer security / Identity / Authentication / Authenticator / Identifier / Access token / Copyright law of the United States / Security / Data / Metadata

The Nature of the Digital Persona and Its Implications for Data Protection Law The Nature of the Digital Persona and Its Implications for Data Protection Law Agenda

Add to Reading List

Source URL: rogerclarke.com.au

Language: English - Date: 2014-01-15 17:48:40
40Mathematics / Numbers / Division / Floating point / Hamming weight / GOST / Arithmetic / Binary arithmetic / Computer arithmetic

NPL Report DITC[removed]February 1988 NATIONAL PHYSICAL LABORATORY The Message Authenticator Algorithm (MAA)

Add to Reading List

Source URL: www.cix.co.uk

Language: English - Date: 2000-01-11 12:05:49
UPDATE