Computer access control

Results: 4654



#Item
701Computer access control / YubiKey / HMAC-based One-time Password Algorithm / Time-based One-time Password Algorithm / Password manager / One-time password / LastPass / CCID / Authentication / Password / Symantec / Dropbox

YubiKey VIP • YubiKey VIP offers strong authentication via Yubico one-time passwords (OTP) with a simple tap or touch of a button and is specially programmed to work with Symantec VIP • Works instantly with no need t

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-04 14:54:44
702Marketing / Internet privacy / World Wide Web / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Online advertising / Direct marketing / Mobile Web / Internet marketing / Mobile web analytics

TAKE 5: WHY DO THEY SAY COOKIES

Add to Reading List

Source URL: apsalar.com

Language: English - Date: 2015-08-05 19:48:38
703Social networking services / Computer access control / XING / Login / Computing / Software / Humancomputer interaction

The login button for your website Win over new users for your website, e-shop, online services or blog with the free login feature from XING. XING login button

Add to Reading List

Source URL: x1.xingassets.com

Language: English - Date: 2016-05-31 06:33:27
704Cloud standards / Computer access control / OAuth / Federated identity / Cloud infrastructure / XACML / Cloud computing / User-Managed Access / Application programming interface / Web 2.0 / Spring Framework

User-centered Security Management of API-based Data Integration Workflows

Add to Reading List

Source URL: demo.a-sit.at

Language: English - Date: 2016-05-12 06:20:07
705Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-07-13 14:29:05
706Economy / Financial services / Payment systems / Business / E-commerce / Computer access control / Banking / Cheque / Numismatics / Debit card / Credit card / One-time password

Contents HOW TO USE CITIBANK ONLINE..................................................................................................................................................................................... 4 I

Add to Reading List

Source URL: www.citibank.com.vn

Language: English - Date: 2015-08-12 04:38:54
707Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-02-08 14:24:54
708Computer access control / Identity management / Identity / Federated identity / Open Identity Exchange / Privacy / Internet privacy

The  Respect  Trust  Framework™   VERSION  2.1  –  2016-­‐02-­‐01   Single  Page  Summary   Purpose   The  purpose  of  the  Respect  Trust  Framework  i

Add to Reading List

Source URL: oixnet.org

Language: English - Date: 2016-03-28 22:23:13
709Computer access control / Prevention / Ingenta / Password / Login / Subscription business model / Access control / Safety

Personal registration and subscription activation on ingentaconnect In order to access your personal subscriptions online, you must complete a one time simple 2-step process. 1. Register Go to: www.ingentaconnect.com/reg

Add to Reading List

Source URL: www.minersoc.org

Language: English - Date: 2015-10-09 05:11:50
710Computer access control / Economy / Cryptography / Computer security / Access control / Authentication / Notary / Packaging / Direct debit / Smart card / Electronic authentication

Business Conditions for Remote Communication (StandScope of services (1) The account/securities account holder may execute banking transactions by means of Remote Communication within the scope offered by

Add to Reading List

Source URL: www.corporates.commerzbank.com

Language: English - Date: 2015-03-03 06:21:28
UPDATE