Security token

Results: 1367



#Item
991Access control / Electronic authentication / Two-factor authentication / Security token / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

[removed][removed][removed]New York State Information Technology Standard No: NYS-S13-004

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-06-26 10:22:41
992Two-factor authentication / Phishing / Password / Security token / Entrust / Authentication / Transaction authentication number / Malware / Identity theft / Security / Computer security / Access control

Securing What’s at Risk: A Common Sense Approach to Protecting Users Online July 2008 © Copyright 2008 Entrust. All rights reserved.

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:46:35
993National security / Electronic commerce / Computer security / Entrust / Criminal Justice Information Services Division / Security token / Federal Bureau of Investigation / Email encryption / Authentication / Security / Computer network security / Crime prevention

CJIS Security Policy Compliance

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:47:48
994Criminal records / Clarksburg /  West Virginia / Criminal Justice Information Services Division / Criminal investigation / Password / Entrust / Security token / Authentication / Authorization / Security / Computer security / Computer network security

Deploying Advanced Authentication for CJIS Compliance A proven, cost-effective strong authentication approach for law enforcement compliance in the United States

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:51:50
995Access control / Credit cards / Data privacy / Electronic commerce / Payment systems / Password / Payment Card Industry Data Security Standard / Two-factor authentication / Security token / Computer security / Security / Computer law

The button for purchases on the keyboard. Online shop.

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2013-01-04 12:45:10
996Federated identity / EAuthentication / Security token / Authentication / Identity theft / Security / Computer security / Technology

Knowledge Based Authentication (KBA) Metrics Santosh Chokhani, Ph.D. February, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
997Computer network security / Internet protocols / Wireless networking / Cryptographic protocols / Extensible Authentication Protocol / Security token / IEEE 802.1X / EAP-SIM / Authentication / Computer security / Computing / Security

An Industry Roadmap for Open Strong Authentication Initiative for Open Authentication An Industry Roadmap for Open Strong Authentication CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:56
998Internet protocols / Identity / Federated identity / Security token / Computer network security / RADIUS / Password authentication protocol / Authentication / Identity management / Computer security / Security / Computing

OATH Reference Architecture Release 1.0 Initiative for Open AuTHentication (OATH) OATH Reference Architecture Release 1.0 CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:29:33
999Access control / Internet protocols / Identity / Internet standards / Cryptographic protocols / Authentication / Security token / Extensible Authentication Protocol / Password authentication protocol / Computer security / Security / Computing

OATH Reference Architecture Release 1

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:30:58
1000Computer security / Intel vPro / Virtual private network / Cisco Systems / Cisco ASA / Intel / Security token / Two-factor authentication / Password / Computer network security / Computing / Electronics

December[removed]Mobile Productivity: Solution Spotlight Cisco AnyConnect* Delivers Stronger, Simpler VPN Security

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:09:14
UPDATE