Security token

Results: 1367



#Item
331Business / Electronic commerce / Embedded systems / Packaging / Financial cryptography / Token coin / Credit card / Electronic money / Debit card / Technology / Payment systems / Security

Cross-Industry Working Team

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2015-01-13 17:22:15
332Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-18 19:04:20
333Federated identity / Security token / Authentication / Password / Mobile banking / One-time password / OpenID / Biometrics / Anakam / Security / Computer security / Access control

CTO Corner August 2013 Future Directions in Authentication Dan Schutzer, CTO, BITS There are a number of trends in the cyber threat, technology and business environments, including mobile banking, social networks, cloud

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-08-08 08:41:17
334Security token / Two-factor authentication / Password / Access token / Password manager / One-time password / Security / Computer security / Access control

Microsoft Word - The GoldKey Vault.docx

Add to Reading List

Source URL: www.goldkey.com

Language: English - Date: 2015-01-01 16:39:32
335Security token / Identity management / Password / Usher / Identity theft / Single sign-on / Authentication / Security / Computer security / Identity

WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit

Add to Reading List

Source URL: www.microstrategy.com

Language: English - Date: 2014-10-01 13:22:05
336Electronic authentication / Security token / Authentication / Access control / Credential / Identity assurance / Two-factor authentication / Identity management / Security / Identity

Considerations for Identity Management in Public Safety Networks

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-03-30 13:45:20
337Cryptography standards / Security token / Safenet / Two-factor authentication / PKCS / Authentication / Smart card / Password / Rainbow Technologies / Cryptography / Security / Public-key cryptography

SafeNet iKey® 2032 PRODUCT BRIEF Benefits • Protects access to data • and sensitive applications

Add to Reading List

Source URL: www.authguard.com

Language: English - Date: 2011-12-09 12:25:16
338Economy of Africa / Security token / Token coin / Africa / Kes / Universal Serial Bus / Nairobi / Economy of Kenya / Kenya

CBK KEPSS SYSTEM USB TOKEN ORDER FORM ============================================================================================= INSTITUTION NAME: _____________________________________________

Add to Reading List

Source URL: www.centralbank.go.ke

Language: English - Date: 2014-07-14 03:33:29
339Computer network security / Contract law / Information technology management / Outsourcing / Service-level agreement / Security token / Information security / Integrated Windows Authentication / Public key infrastructure / Cryptography / Security / Computer security

STANDARD TERMS AND CONDITIONS

Add to Reading List

Source URL: vanguard.business.gov.au

Language: English - Date: 2015-01-22 19:36:59
340System administration / Transaction processing / Tamper resistance / System software / Information technology management / Security token / Two-factor authentication / Technology / Project management / Scalability

Folk-IS: Opportunistic Data Services in Least Developed Countries N. Anciaux1, 2, L. Bouganim1, 2, T. Delot 3,1, S. Ilarri4, L. Kloul2, N. Mitton1, P. Pucheral1, 2 1 INRIA, France

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2013-12-06 16:23:06
UPDATE