Security token

Results: 1367



#Item
111Standards organizations / OSGi / Smartphones / Software architecture / Apache Felix / Android / Security token / Kernel / X Window System / Communications protocol / Component-based software engineering / Operating system

Smart and Secure Cross-Device Apps for the Internet of Advanced Things Christoph Busold1 , Stephan Heuser1 , Jon Rios1 , Ahmad-Reza Sadeghi2 , and N. Asokan3 1

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:46
112Computer access control / E-commerce / Online banking / Cybercrime / Security token / Bank / Transaction authentication number / User / Password / Computer security / Multi-factor authentication / Guardian Analytics

Online Banking User Guide Business Online Security The security of your information is one of our most important responsibilities. You can be confident, knowing that Alpine Bank is dedicated to ensuring the highest level

Add to Reading List

Source URL: www.alpinebank.com

Language: English - Date: 2013-12-17 13:20:47
113Business models / Media industry / Subscription business model / E-commerce / Terms of service / Webmail / Security token / Apple ID

GENERAL TERMS OF USE AND SALE OF IZNEO ONLINE SERVICES Last updated on: June 3, 2015 The present terms of use and sale are agreed between IZNEO, a simplified joint stock company with capital of 300,000 euros, registered

Add to Reading List

Source URL: www.izneo.com

Language: English - Date: 2016-03-01 12:43:53
114Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

+entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2016-01-14 11:24:30
115Computing / Technology / Software / Mobile phones / Computer access control / Information appliances / Cloud clients / Smartphones / Mobile app / Security token / Mobile device management / Mobile device

Top 5 Reasons Why Mobile Will Transform Enterprise Authentication

Add to Reading List

Source URL: www.entrust.com

Language: English
116Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-09-17 14:36:44
117Computer access control / Computer security / Access control / Password / SiteKey / Login / Security token / Single sign-on / Online banking / Password manager / Password fatigue

ONLINE BANKING USER GUIDE User Login - Creating Your Login Credentials STEP 01 Enter & Change Your Company’s Master Credentials An ID & password can be found in the welcome letter you received; otherwise, they will

Add to Reading List

Source URL: www.alpinebank.com

Language: English - Date: 2015-06-10 09:51:10
118Cryptography / Tokenization / Software engineering / Computer programming / Computing / Lexical analysis / Token / Search engine indexing / Security token / Payment processor / Payment card number / Naming convention

Guideline: Tokenization Product Security Guidelines Version: 1.0 Date:

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-04-02 02:17:56
119Computer access control / Security token / Access token / Token / Password / Pseudonymity / Authentication / Blind signature

FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2011-08-18 16:53:40
120Cryptography / Computer security / Computing / Computer access control / Notary / Public-key cryptography / Identity management / Direct Anonymous Attestation / Password / Internet Relay Chat / Security token / Proxy server

BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-12-16 18:40:43
UPDATE