Security token

Results: 1367



#Item
231Cryptographic protocols / Electronic commerce / Secure communication / Smart cards / Payment systems / Security token / HTTP Secure / Password / Phishing / Computing / Security / Internet

Secure Confirmation of Sensitive Transaction Data in Modern Internet Banking Services* Thomas Weigold IBM Research - Zurich Abstract— In recent years attacks on Internet banking services

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2012-07-04 04:10:11
232Security / Computer security / Cyberwarfare / Security token / Cryptographic protocols / Public-key cryptography / X.509

           

Add to Reading List

Source URL: download.nabto.com

Language: English - Date: 2015-05-07 08:03:02
233Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
234Internet protocols / One-time password / Two-factor authentication / HOTP / Password / SecurID / Secure Shell / Authentication / Security token / Security / Cryptography / Computer security

Version 1.0 Cornelius Kölbel () MayCC BY-NC-SA 4.0) Everybody knows that a password - be it simple or even complex - is a potential vulnerability. Two factor authentication is the way to authen

Add to Reading List

Source URL: www.linuxtag.org

Language: English - Date: 2014-05-10 10:33:00
235Password / Keystroke dynamics / Eye tracking / Keystroke logging / Security token / Virtual keyboard / Challenge-response authentication / Partial Password / OTPW / Human–computer interaction / Security / Computing

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
236Cryptographic software / Software / Privacy software / Cross-platform software / OpenPGP card / GNU Privacy Guard / Security token / Pretty Good Privacy / GPGTools / PGP / Cryptography / Computer security

Gnuk — An OpenPGP USB Token Implementation Niibe Yutaka <> About Me Contributor to GNU Project

Add to Reading List

Source URL: www.gniibe.org

Language: English - Date: 2014-05-21 01:03:40
237Computer network security / Crime prevention / National security / Access control / Identity management / Access token / Information security / Network security / User / Security / Computer security / Computing

bel_SolutionCenter_HGweiss

Add to Reading List

Source URL: www.bachmann.info

Language: English - Date: 2014-11-04 05:44:53
238Computer network security / Key management / Cloud infrastructure / Apache Hadoop / Cloud computing / Single sign-on / Kerberos / Generic Security Services Application Program Interface / Access token / Computing / Computer security / Cryptography

Hadoop Security Design Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Yahoo! {owen,kan,sradia,rmarti,cnh}@yahoo-inc.com October 2009

Add to Reading List

Source URL: issues.apache.org

Language: English
239Two-factor authentication / Usability / Authentication / Security token / Likert scale / Password / Email / Multi-factor authentication / One-time password / Security / Access control / Technology

Microsoft Word - Poster abstaract - Balancing usability and security in the business cloud authentication V3.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
240Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-11 18:21:13
UPDATE