Security token

Results: 1367



#Item
291Password / Security token / Two-factor authentication

CASE STUDY: Telecommunications Romtelecom Security Optimization and Cost Minimization for VPN Logon process Romtelecom, one of the largest Telecommunications Providers in Romania, chose SMS Passcode to maximize the secu

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-06-18 04:16:24
292Password / Transaction authentication number / Access token / Trustee Savings Bank / Cyberwarfare / Password manager / Security / Lloyds Banking Group / Security token

BusinessBank Super User/Token User Application Title of Business Token user PLEASE TICK ONE BOX

Add to Reading List

Source URL: www.tsbbank.co.nz

Language: English - Date: 2014-10-12 21:57:02
293Cryptography / System software / Password / USB flash drive / Security token / Ghost / Windows / Encrypting File System / BitLocker Drive Encryption / Disk encryption / Software / Cryptographic software

TM ENTERPRISE EDITION Version 4

Add to Reading List

Source URL: autonomicresources.com

Language: English - Date: 2012-12-12 15:18:57
294Two-factor authentication / Remote desktop / SMS / Password / Citrix Systems / Electronic commerce / Technology / Mobile technology / Security token

CASE STUDY: COMMUNICATIONS & LOGISTICS Photo:Lars Schmidt LEADING OPERATOR WITHIN COMMUNICATION AND LOGISTICS IN NORTHERN EUROPE

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-02-27 12:28:27
295Cyberwarfare / Electronic commerce / Civil law / Token coin / Tokens / Group signature / Security / Public key certificate / Digital signature / Cryptography / Key management / Public-key cryptography

Full version of an extended abstract published in Proceedings of ACM CCS 2006, ACM Press, 2006. Available from the IACR Cryptology ePrint Archive as ReportHow to Win the Clone Wars: Efficient Periodic n-Times

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-04-11 21:27:39
296Authentication / Password / Phishing / Multi-factor authentication / SMS / Anakam / Security / Technology / Security token

CASE STUDY: Legal Bruun & Hjejle Leading law firm steps up their authentication with SMS PASSCODE

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-06-18 04:16:12
297Data / Secure communication / Internet protocols / Electronic commerce / Internet standards / Transport Layer Security / WS-Security / WS-SecureConversation / Cipher suite / Cryptography / Computing / Cryptographic protocols

Appears in C. Pautasso, T. Gschwind (Eds.): 2nd ECOWS Workshop on Emerging Web Services Technology – WEWST 2007, CEUR Workshop Proceedings (CEUR-WS.org) Vol-313, ISSN, 2008. SSL-over-SOAP: Towards a Token-bas

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2008-01-13 08:10:17
298Two-factor authentication / Password / SMS / Phishing / Transaction authentication number / Authentication / Anakam / Security token / Technology / Security / Mobile technology

CASE STUDY: CONSTRUCTION & ENGINEERING Increased user security without the hassle Day & Sons Ltd, was established by the late John Day, who delivered coal to London’s power stations, businesses and homes during the Se

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-03-04 09:08:57
299Computing / Tokens / Data transmission / Security token / Oblivious transfer / Actor model / Token / Universal composability / Access token / Cryptographic protocols / Data / Information

c IACRThis article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 2013 December 3. The version published by Springer-Verlag is available at . (Efficient) Universally C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-11 22:12:12
300Computing / Computer law / Credit cards / Data privacy / Payment Card Industry Data Security Standard / Privileged Identity Management / Information security / Password / Security token / Computer security / Security / Payment systems

SOLUTION BRIEF THE CA TECHNOLOGIES SOLUTION FOR PCI COMPLIANCE How Can the CA Security Solution Help Me With

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-10-22 11:34:08
UPDATE