Security token

Results: 1367



#Item
991Access control / Electronic authentication / Two-factor authentication / Security token / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

[removed][removed][removed]New York State Information Technology Standard No: NYS-S13-004

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-06-26 10:22:41
992Securing What’s at Risk: A Common Sense Approach to Protecting Users Online July 2008 © Copyright 2008 Entrust. All rights reserved.

Securing What’s at Risk: A Common Sense Approach to Protecting Users Online July 2008 © Copyright 2008 Entrust. All rights reserved.

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:46:35
993CJIS Security Policy Compliance

CJIS Security Policy Compliance

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:47:48
994Deploying Advanced Authentication for CJIS Compliance A proven, cost-effective strong authentication approach for law enforcement compliance in the United States

Deploying Advanced Authentication for CJIS Compliance A proven, cost-effective strong authentication approach for law enforcement compliance in the United States

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:51:50
995The button for purchases on the keyboard. Online shop.

The button for purchases on the keyboard. Online shop.

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2013-01-04 12:45:10
996Knowledge Based Authentication (KBA) Metrics Santosh Chokhani, Ph.D.  February, 2004

Knowledge Based Authentication (KBA) Metrics Santosh Chokhani, Ph.D. February, 2004

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-25 01:00:00
997An Industry Roadmap for Open Strong Authentication Initiative for Open Authentication An Industry Roadmap for Open Strong Authentication  CONTENTS

An Industry Roadmap for Open Strong Authentication Initiative for Open Authentication An Industry Roadmap for Open Strong Authentication CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:56
998OATH Reference Architecture Release 1.0 Initiative for Open AuTHentication (OATH) OATH Reference Architecture Release 1.0  CONTENTS

OATH Reference Architecture Release 1.0 Initiative for Open AuTHentication (OATH) OATH Reference Architecture Release 1.0 CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:29:33
999OATH Reference Architecture Release 1

OATH Reference Architecture Release 1

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:30:58
1000December[removed]Mobile Productivity: Solution Spotlight Cisco AnyConnect* Delivers Stronger, Simpler VPN Security

December[removed]Mobile Productivity: Solution Spotlight Cisco AnyConnect* Delivers Stronger, Simpler VPN Security

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:09:14