Key authentication

Results: 993



#Item
551One-time password / Two-factor authentication / Password / Authentication / SMS / Transaction authentication / Phishing / Security token / Mobile banking / Security / Technology / Computer security

` Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication Executive Summary

Add to Reading List

Source URL: www.tyntec.com

Language: English - Date: 2014-03-11 10:59:53
552Electronic commerce / Public key infrastructure / Authentication / Proxy server / Public key certificate / Certificate authority / Digital credential / Certisign / Security and safety features new to Windows Vista / Cryptography / Public-key cryptography / Key management

Microsoft Word - SLASIAC_Resolution_C.doc

Add to Reading List

Source URL: libraries.universityofcalifornia.edu

Language: English - Date: 2012-11-02 13:37:41
553Notary / Cryptographic protocols / Electronic signature / Public key certificate / Digital signature / X.509 / Identity document / Signature / Authentication / Cryptography / Public-key cryptography / Key management

Microsoft Word - Electronic Signatures Standard.docx

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:14
554Fingerprints / Biometrics / Access control / Two-factor authentication / Password / Authentication / Public key fingerprint / BioAPI / Password manager / Security / Cryptography / Identification

The Case for Replacing Passwords with Biometrics Markus Jakobsson Extricatus LLC Abstract—The threat of malware and phishing is engulfing the web. It is expected to be an even greater threat in the mobile

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2012-04-22 18:29:26
555Public-key cryptography / Passphrase / FIPS 140 / Hardware security module / Key / Password / Oracle Database / Authentication / PKCS / Cryptography / Cryptography standards / Key management

Microsoft Word - OKM Security and Authentication.final.docx

Add to Reading List

Source URL: www.oracle.com

Language: English
556Biometrics / Fingerprints / Access control / Authentication / Notary / Packaging / IPhone / Public key fingerprint / Security / Cryptography / Apple Inc.

Microsoft Word - 2013_12_3_AlpVision_Newsletter.doc

Add to Reading List

Source URL: www.alpvision.com

Language: English - Date: 2013-12-06 02:43:50
557Data security / Key management / Computer network security / Secure Shell / Information security / Password / Authentication / NIST Special Publication 800-53 / Key size / Security / Cryptography / Computer security

A Compliance White Paper What CISO’s Need to Know About The New NIST Guidelines for Secure Shell What CISO’s Need to Know About The New NIST Guidelines for Secure Shell

Add to Reading List

Source URL: www.ssh.com

Language: English - Date: 2014-08-21 00:37:26
558Identification / Fingerprint / Fingers / Human anatomy / Access control / Received signal strength indication / Two-factor authentication / Public key fingerprint / Security / Fingerprints / Biometrics

˜ 2011 INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN), 21-23 SEPTEMBER 2011, GUIMARAES, PORTUGAL Mol´e: a Scalable, User-Generated WiFi Positioning Engine

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2011-09-26 12:22:56
559Password / Digital signature / Form / Authentication / Cryptography / Civil law / Notary

Instructions for completing the Fundraising Request Form[removed]Fill out the appropriate information requested. Use the Tab key to go to the next item. 2. Financial Summary. Please complete all items that apply. If a

Add to Reading List

Source URL: www.nhcs.net

Language: English - Date: 2012-08-15 14:52:04
560Biometrics / IOS / IPhone / Smartphones / Fingerprint / Authentication / Public key fingerprint / Security / Cryptography / Apple Inc.

Microsoft Word - 2014_02_3_AlpVision_Newsletter.doc

Add to Reading List

Source URL: www.alpvision.com

Language: English - Date: 2014-01-31 10:56:10
UPDATE