Multi-factor authentication

Results: 297



#Item
1en19  Original Article Behavioural Biometrics for Multi-Factor Authentication in Biomedicine

en19 Original Article Behavioural Biometrics for Multi-Factor Authentication in Biomedicine

Add to Reading List

Source URL: www.ejbi.org

Language: English - Date: 2017-06-28 11:47:41
    2CLAVISTER  Multi Factor Authentication F E AT U R E S 	  ƒƒ strong

    CLAVISTER Multi Factor Authentication F E AT U R E S ƒƒ strong

    Add to Reading List

    Source URL: www.hermitage.be

    Language: English - Date: 2017-11-09 05:58:22
      3

      Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

      Add to Reading List

      Source URL: www.azbar.org

      - Date: 2017-05-17 18:29:57
        4A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1  2

        A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-09-17 07:10:18
          5Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright © 2015 Centrify Corporation. All Rights Reserved.

          Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright © 2015 Centrify Corporation. All Rights Reserved.

          Add to Reading List

          Source URL: res.cdn.sys-con.com

          - Date: 2016-11-15 09:40:01
            6Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

            Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            - Date: 2007-07-24 11:28:38
              7PROJECT DESCRIPTION  MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

              PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

              Add to Reading List

              Source URL: nccoe.nist.gov

              Language: English - Date: 2016-07-28 08:23:01
              8Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

              Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

              Add to Reading List

              Source URL: jon.oberheide.org

              Language: English - Date: 2015-10-18 22:20:40
              9ConsentID_datasheet1.indd

              ConsentID_datasheet1.indd

              Add to Reading List

              Source URL: www.aeteurope.com

              Language: English - Date: 2016-03-09 10:47:55
              10plug´n´trust  plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

              plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

              Add to Reading List

              Source URL: planc.biz

              Language: English - Date: 2011-01-27 05:18:57