Security token

Results: 1367



#Item
91Computer access control / Online banking / Security token / Password / Transaction authentication number / Bank

Internet Banking Service Request Form Customer Details Name Date

Add to Reading List

Source URL: www.hsbc.com.bd

Language: English - Date: 2010-11-01 04:59:21
92Computer access control / Internet protocols / Multimedia / Network protocols / Internet broadcasting / Streaming media / Security token / Hypertext Transfer Protocol / Proxy server / Adaptive bitrate streaming / Time-based One-time Password Algorithm

Practically engageable adversaries for streaming media Brian Sniffen Akamai Technologies

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2009-10-07 17:00:20
93

Crypto Update for BLU annual keysigning – Bill n1vux NEWS * RSA token break _https://www.schneier.com/blog/archivesdetails_of_the.html_ * Mac OSX Lion Security Flaw Permits Non-Root PWD Hash Views  _http://w

Add to Reading List

Source URL: www.blu.org

Language: English - Date: 2011-09-25 21:40:13
    94

    DATA SHEET uTrust Token Pro + Mobile Embedded Security under Your Control

    Add to Reading List

    Source URL: files.identiv.com

    Language: English - Date: 2016-04-19 16:35:49
      95Computer access control / Security token / Authentication / Token / Access token / Contract

      TOKEN REQUEST FORM Diamond Bank Plc. RCCustomer Information Type of Account

      Add to Reading List

      Source URL: www.diamondbank.com

      Language: English - Date: 2016-05-26 13:33:00
      96Computer access control / Identity management / Federated identity / Identity documents / Electronic authentication / Public administration / Multi-factor authentication / FIPS 201 / Authentication / Password / Privileged identity management / Security token

      Best Practices for Privileged User PIV Authentication

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2016-04-21 07:36:03
      97Computer access control / Authentication / Secret sharing / Security token / Pico / Wi-Fi / Server / Password

      To Have and Have Not: Variations on Secret Sharing to Model User Presence Quentin Stafford-Fraser University of Cambridge Computer Lab

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2014-07-05 13:33:42
      98Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

      Yubico Best Practices: OATH-HOTP

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-02-19 11:38:08
      99Computer access control / YubiKey / Universal 2nd Factor / Gmail / Dropbox / CCID / Password / Authentication / One-time password / Fog Investigation and Dispersal Operation / Security token / Strong authentication

      FIDO U2F Security Key • FIDO U2F Security Key by Yubico offers strong authentication with a simple touch of a button • Works instantly with no need to re-type passcodes -replacing SMS texts and authenticator apps

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2016-02-08 14:24:54
      100Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

      Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2016-05-17 22:04:37
      UPDATE