One-time password

Results: 498



#Item
141Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
142Health informatics / Security token / Two-factor authentication / Electronic prescribing / Authentication / Biometrics / Electronic medical record / One-time password / Multi-factor authentication / Security / Health / Access control

DATA SHEET CA Technologies and BIO-key™ Solution for Secure Electronic Prescribing of Controlled Substances At a Glance

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-19 14:10:15
143Password / Cryptographic software / S/KEY / One-time password / Cryptographic hash functions / Password strength / Random password generator / Cryptography / Security / Computer security

Functional Programming and Specification Practical 1 This practical exercise is to be completed by 4pm on Tuesday 8th February. It will be marked but the mark will not contribute to the overall mark for the course. Pleas

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2011-02-04 03:56:19
144Password / Two-factor authentication / One-time password / Payment systems / Electronic commerce / Authentication / Chip Authentication Program / 3-D Secure / Security / Cryptography / Access control

4.1 Application Method Primary User (PU) * Delegated User (DU) * The application can be facilitated

Add to Reading List

Source URL: www.ncb.com.hk

Language: English - Date: 2012-06-29 03:31:19
145HOTP / Cryptographic protocols / Hardware security module / PKCS / SecurID / Key Management Interoperability Protocol / One-time password / X Window System / PKCS11 / Cryptography / Internet protocols / Cryptography standards

Key Management SDKs Complete vendor-independent key management solution 01010101100100101101001101110010101011010101010 KEY MANAGEMENT

Add to Reading List

Source URL: www.cryptsoft.com

Language: English - Date: 2015-04-27 12:14:08
146Cryptography / Password / One-time password / Authentication / IPAQ / S/KEY / Bluetooth / Security / Mobile computers / Technology

Loud and Clear: Human-Verifiable Authentication Based on Audio Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun Department of Computer Science University of California, Irvine {goodrich,ms

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-28 12:55:55
147Integrated Digital Enhanced Network / Mobile banking / Password / Android / Software / Technology / Mobile technology / One-time password

POR_DataSheet_DEVICEAUT_Revisao final.ai

Add to Reading List

Source URL: www.easysol.net

Language: English - Date: 2014-08-20 12:43:06
148Surveillance / Password / Keystroke logging / One-time password / Security token / Password manager / Hardware keylogger / Security / Espionage / Cryptography

Poster: Input Password Only with Arrow Keys Nami Hidaka Saki Naguchi Manabu Okamoto

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
149Two-factor authentication / One-time password / Authentication / Credit card / Payment systems / Electronic commerce / Security token / Chip Authentication Program / Security / Access control / Password

4.1 Application Method Primary User (PU) * Delegated User (DU) * Please fill in the “Security Device

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-04-09 07:56:18
150Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography

Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 10:31:13
UPDATE