Computer access control

Results: 4654



#Item
691Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

Best Practices for Privileged User PIV Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-21 07:36:03
692Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-05 13:33:42
693Computer access control / Cryptography / Computing / Computer security / YubiKey / PrivacyIDEA / OpenPGP card

YubiKey NEO • Works instantly with no need to re-type passcodes -replacing SMS texts, authenticator apps, RSA tokens, and similar devices Description:

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 16:10:41
694Cryptography / Key management / Public key infrastructure / Reputation management / Identity management / Computer access control / Web of trust / Authentication / Trust / Public key certificate / Blockchain / Internet privacy

Rebranding the Web of Trust A White Paper from Rebooting the Web of Trust by Shannon Appelcline, Dave Crocker, Randall Farmer, and Justin Newton

Add to Reading List

Source URL: www.weboftrust.info

Language: English - Date: 2016-06-08 16:57:37
695Income tax in India / Permanent account number / Identity document / Romanian identity card / Czech national identity card / Government / Security / Computer access control

Date: Annexure 2: Submission of details of Authorised Signatories/ Power of Attorney Holders 1) Name Customer Relationship Number (CRN) Permanent Account No (PAN)

Add to Reading List

Source URL: www.rbs.in

Language: English - Date: 2015-05-19 06:25:18
696Computing / Digital media / Computer access control / Identity management systems / Identity management / Security Assertion Markup Language / Password / Email / Infrastructure optimization / Internet

Align Engage your employees with secure video. Ustream Align makes it easy to deliver town halls, trainings and departmental communications to employees everywhere.

Add to Reading List

Source URL: info.ustream.tv

Language: English - Date: 2016-06-04 02:23:00
697Computing / Network architecture / OSI protocols / Wireless networking / Network performance / Computer networking / Packet loss / Carrier sense multiple access with collision avoidance / OSI model / Data link layer / Communications protocol / Transmission Control Protocol

Sharing a Medium Between Concurrent Protocols Without Overhead Using the Capture Effect ¨ Michael Konig Roger Wattenhofer

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2016-02-04 04:44:23
698Computer access control / Computing / Identity management / GARR / OpenID / AAI

Authentication and Authorisation for Research and Collaboration JRA.14 Future work Davide Vaghetti

Add to Reading List

Source URL: aarc-project.eu

Language: English - Date: 2016-05-25 10:41:42
699Economy / Financial services / Payment systems / Money / E-commerce / Computer access control / Banking / Cheque / Numismatics / Debit card / Payment / Credit card

Contents HOW TO USE CITIBANK ONLINE..................................................................................................................................................................................... 4 I

Add to Reading List

Source URL: www.citibank.com.vn

Language: English - Date: 2015-08-12 04:38:54
700Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

Yubico Best Practices: OATH-HOTP

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-19 11:38:08
UPDATE