Multi-factor authentication

Results: 297



#Item
11CASE STUDY  Cyber-security offering strong, cost effective two factor authentication. Small businesses

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
12Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
13Smartphones Editor: Roy Want n Google n  Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
14Accountability – The Key to Expanding Global Commerce p9.ai

Accountability – The Key to Expanding Global Commerce p9.ai

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:41
15Mapping ISO27001 <> PCI-DSS 2.0

Mapping ISO27001 <> PCI-DSS 2.0

Add to Reading List

Source URL: www.forinsect.com

Language: English - Date: 2011-08-26 04:51:29
16Mobile multifactor security  A revolution in authentication and digital signing Mobile multifactor security

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
17THE FACTS: PASSWORDS & SECURING YOUR ACCOUNTS Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords. How do I create a good password?

THE FACTS: PASSWORDS & SECURING YOUR ACCOUNTS Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your passwords. How do I create a good password?

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
18ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-18 08:41:31
19ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
20Aintree NHS – Case Study  Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36