Security token

Results: 1367



#Item
281Computer network security / Federated identity / Identity management / Kerberos / Single sign-on / Authentication / Access token / Principal / Authorization / Security / Computer security / Access control

Accountability and Control of Process Creation in Metasystems Marty Humphrey, Frederick Knabe, Adam Ferrari, and Andrew Grimshaw Department of Computer Science University of Virginia Charlottesville, VA

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2001-09-17 13:13:14
282Security / WS-Security / Security token / Internet security / SOAP / Public-key cryptography / Kerberos / Cryptography / Security service / Computing / Computer security / Computer network security

Web Services Security

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-11-26 02:19:12
283Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
284DEME / Authentication / Access token / Multi-factor authentication / Password / Security / Access control / Two-factor authentication

CASE STUDY: CONSTRUCTION & ENGINEERING Photo:Lars Schmidt DEME REPLACES TOKEN-BASED SOLUTION TO REGAIN CONTROL OF USER AUTHENTICATION

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-02-27 12:33:33
285Computer network security / Internet protocols / Federated identity / Single sign-on / Security token / Secure Shell / Integrated Windows Authentication / Stonesoft Corporation / Virtual private network / Computer security / Computing / Security

a2cloud Solution for secured authentication and access to cloud Whitepaper Combining Modern Authentication Needs

Add to Reading List

Source URL: www.link-connect.com

Language: English - Date: 2013-07-15 09:30:37
286Surveillance / Password / Keystroke logging / One-time password / Security token / Password manager / Hardware keylogger / Security / Espionage / Cryptography

Poster: Input Password Only with Arrow Keys Nami Hidaka Saki Naguchi Manabu Okamoto

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
287Business / Online banking / Security token / Password / Two-factor authentication / Trustee Savings Bank / Transaction authentication number / Cheque / Bank / Payment systems / Finance / Technology

HomeBank Application Please tick the services you would like:

Add to Reading List

Source URL: www.tsbbank.co.nz

Language: English - Date: 2013-06-11 17:49:58
288Two-factor authentication / One-time password / Authentication / Credit card / Payment systems / Electronic commerce / Security token / Chip Authentication Program / Security / Access control / Password

4.1 Application Method Primary User (PU) * Delegated User (DU) * Please fill in the “Security Device

Add to Reading List

Source URL: www.bochk.com

Language: English - Date: 2015-04-09 07:56:18
289Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-12 04:26:12
290Cryptographic protocols / Cryptographic software / Internet protocols / Password / Security token / S/KEY / One-time password / Key-agreement protocol / Salt / Security / Computer security / Cryptography

Prompted User Retrieval of Secret Entropy: The Passmaze Protocol Daniel R. L. Brown∗ December 15, 2005 Abstract A prompting protocol permits users to securely retrieve secrets with greater entropy than

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-23 10:31:13
UPDATE