Multi-factor authentication

Results: 297



#Item
81

Multi-Factor Authentication for More Resilient Distributed Storage in Wireless Networks [Technical Report] Scott Bell Eugene Vasserman

Add to Reading List

Source URL: people.cis.ksu.edu

Language: English - Date: 2013-03-05 20:19:29
    82Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

    +entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

    Add to Reading List

    Source URL: www.entrust.com

    Language: English - Date: 2016-01-14 11:24:30
    83Computer security / Computer access control / Access control / Federated identity / Identity management / Computer network security / Identity documents / Electronic authentication / Authentication / Multi-factor authentication / Knowledge-based authentication / Password

    White Paper Financial Services Identity Management in an era of tell-all and technology overload Protect your most priceless assets under management: Your customers.

    Add to Reading List

    Source URL: lexisnexis.com

    Language: English - Date: 2014-10-15 08:43:58
    84

    LNCSA Modular Framework for Multi-Factor Authentication and Key Exchange

    Add to Reading List

    Source URL: manulis.eu

    Language: English - Date: 2015-03-31 12:18:23
      85Identity management / Computer security / Computer access control / Identity / Federated identity / Identity assurance / Authentication / Multi-factor authentication / Knowledge-based authentication / Identity document / Electronic authentication / Identity score

      White Paper Identity Proofing: Government’s first line of defense against fraud and improper payments We haven’t been formally introduced. But I’d like my Social Service Benefits now, please.

      Add to Reading List

      Source URL: lexisnexis.com

      Language: English - Date: 2014-10-15 08:44:03
      86Computer access control / Computer security / Cryptography / Security / One-time password / Google Authenticator / Sina Weibo / Cross-site request forgery / Authentication / Short Message Service / Multi-factor authentication

      Security report for Peatio exchange Peatio is an open source Bitcoin exchange: https://github.com/peatio/peatio    Hijacking the account

      Add to Reading List

      Source URL: sakurity.com

      Language: English - Date: 2016-01-11 15:40:03
      87Computer access control / Identity documents / Access control / Authentication / Notary / Packaging / Multi-factor authentication / Personal identification number

      FBMS Personal Identification Verification Card Access The FBMS system has recently migrated to a new platform, changing the path to access FBMS. You will now be required to access FBMS through the Department of the Inter

      Add to Reading List

      Source URL: www.bie.edu

      Language: English - Date: 2015-06-29 15:07:41
      88Computer access control / Security / Computer security / Identity management systems / Identity management / Access control / Password / Self-service password reset / Single sign-on / Multi-factor authentication / Authentication / Provisioning

      PDF Document

      Add to Reading List

      Source URL: www.fischerinternational.com

      Language: English - Date: 2015-11-18 09:38:57
      89Password / SMS / Phishing / Multi-factor authentication / Authentication / Security Support Provider Interface / Anakam / Security / Technology / Two-factor authentication

      CASE STUDY: HEALTH CARE THE BASELLAND CANTONALHOSPITAL IN SWITZERLAND USES MULTI-FACTOR AUTHENTICATION TO PROTECT SENSITIVE PATIENT AND RESEARCH DATA. The Kantonsspital Baselland (Baselland cantonal hospital – KSBL)

      Add to Reading List

      Source URL: www.smspasscode.com

      Language: English - Date: 2015-05-18 03:07:12
      90Internet protocols / Two-factor authentication / Single sign-on / RADIUS / Authentication / Password / Multi-factor authentication / Extensible Authentication Protocol / Identity management / Security / Computer security / Access control

      C OD E42 T E C HN O LO GY N OT E Two-factor Authentication Increases security, decreases risk

      Add to Reading List

      Source URL: essentials.code42.com

      Language: English
      UPDATE