Multi-factor authentication

Results: 297



#Item
61Computer security / Computer access control / Security / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Internet advertising / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following:   

Add to Reading List

Source URL: secure.ifastpensions.com

Language: English - Date: 2014-09-25 08:27:41
62Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

Best Practices for Privileged User PIV Authentication

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-04-21 07:36:03
63

Multi-Factor Authentication for first time users **Multi-Factor Authentication will be required for all Duke University accounts on July 1st, 2016.** What is Multi-Factor Authentication (MFA)?? Multi-factor authenticatio

Add to Reading List

Source URL: it.fuqua.duke.edu

Language: English - Date: 2016-03-14 10:00:39
    64Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

    Yubico Best Practices: OATH-HOTP

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-02-19 11:38:08
    65Computer access control / Computer security / Cryptography / Identity management / Cybercrime / Password / Salt / Passwd / One-time password / Password policy / Random password generator / Multi-factor authentication

    contributed articles DOI:Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2015-07-13 14:29:05
    66Software / Cryptographic software / Computer security / Computer access control / Google Chrome extensions / Mozilla add-ons / Dashlane / Cryptography / Password / Salt / OpenSSL / Multi-factor authentication

    Dashlane Security White Paper v2.8 Dashlane Security Whitepaper March 2016 1. General Security Principles a. Protection of User Data in Dashlane

    Add to Reading List

    Source URL: www.dashlane.com

    Language: English - Date: 2016-03-23 12:49:58
    67Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

    Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 20:42:08
    68Computer security / Computer access control / Security / Prevention / Authentication / Multi-factor authentication / Identity theft / Money laundering / Security token / Information security / Internet security / Identity management

    Complying with rules for identity management An Economist Intelligence Unit briefing paper sponsored by IdenTrust

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:42
    69Computer access control / E-commerce / Supply chain management / Distribution / Computer network security / Authentication / Multi-factor authentication / Supply chain / Identity theft / Biometrics / Smart card / Security token

    The global supply chain Challenges for small and midsize enterprises An Economist Intelligence Unit briefing paper sponsored by IdenTrust

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2012-07-10 20:41:42
    70Computer access control / Computer security / Cryptography / Access control / FIDO Alliance / Authentication / Strong authentication / Multi-factor authentication / Universal 2nd Factor / Fido Solutions / Password / Security token

    Response to the European Banking Authority (EBA) Discussion Paper on Future Draft Regulatory Technical Standards on Strong Customer Authentication and Secure Communication Under the Revised Payment Services Directive (PS

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2016-02-05 15:46:07
    UPDATE