Security token

Results: 1367



#Item
251Bank / Security token / Financial services / Technology / Finance / Bendigo Bank / Online banking / Bendigo

Microsoft Word - OA037adoc

Add to Reading List

Source URL: communitysectorbanking.com.au

Language: English - Date: 2015-01-12 00:01:23
252Computer security / Technology / Smart cards / One-time password / Transaction authentication number / Password / Contactless smart card / Subscriber identity module / Security token / ISO standards / Ubiquitous computing / Security

mobile Solution for e-travel document security exchange

Add to Reading List

Source URL: www.monetplus.cz

Language: English - Date: 2014-12-01 10:30:08
253Computer network security / Internet protocols / Self-certifying File System / Password authentication protocol / Security token / Kerberos / Access token / Password / RADIUS / Computing / Computer security / Microsoft Windows

To appear in the 19th ACM Symposium on Operating Systems Principles (SOSP ’03) Decentralized User Authentication in a Global File System Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek MIT Comput

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2003-08-31 20:05:26
254Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 17:40:37
255Security / Two-factor authentication / Solid-state drive / Cryptographic software / DataLock Technology / Password / Radio-frequency identification / Security token / Computing / Disk encryption / Technology

datal o c ke r.c o m DL3 ™

Add to Reading List

Source URL: datalocker.com

Language: English - Date: 2014-11-25 09:35:42
256Credit card / Transaction authentication number / System software / Security / Computing / Pseudonymous remailer / Access token / Token coin

Untraceable Nym Creation on the Freedom 2.0 Network™ Russell Samuels Ed Hawco November 1, 2000 Version 2.0

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:41:54
257Biometrics / Computer network security / Two-factor authentication / Authentication / Multi-factor authentication / Password / Fingerprint / Keystroke dynamics / Security token / Security / Access control / Identification

ID Director for ISAM May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-05-16 10:45:54
258Biometrics / Computer network security / Two-factor authentication / Authentication / Multi-factor authentication / Password / Fingerprint / Keystroke dynamics / Security token / Security / Access control / Identification

ID Director for ISAM May 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-05-16 10:52:32
259McAfee / Security token / One-time password / Two-factor authentication / Single sign-on / Password / Authentication / McAfee VirusScan / Password manager / Security / Computer security / Access control

Data Sheet McAfee One Time Password Two-factor authentication for secure login

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-11-20 19:51:55
260McAfee / Security token / One-time password / Two-factor authentication / Single sign-on / Password / Authentication / McAfee VirusScan / Password manager / Security / Computer security / Access control

Data Sheet McAfee One Time Password Two-factor authentication for secure login

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-11-20 19:51:55
UPDATE