Security token

Results: 1367



#Item
361Key management / ID-based encryption / Delay-tolerant networking / ID-based cryptography / Security token / Tor / Public key infrastructure / Data Mule / Roaming / Cryptography / Network architecture / Public-key cryptography

Practical Security for Disconnected Nodes Aaditeshwar Seth Srinivasan Keshav School of Computer Science University of Waterloo, Canada {a3seth, keshav}@uwaterloo.ca

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2006-03-26 21:15:04
362McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
363Computer security / Pre-boot authentication / Security token / Two-factor authentication / Password / Serial ATA / Authentication / Hardware-based full disk encryption / BitLocker Drive Encryption / Cryptography / Disk encryption / Security

End Point Security DigiSAFE DiskCrypt Features and Benefits Real-Time Hardware-Based Encryption

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:51
364FeliCa / Ubiquitous computing / Near field communication / Bit rate / Smart card / ISO standards / Technology / Telecommunications engineering

Contactless IC Token The RC-S892 and RC-S893 products are suitable for applications that demand robust security. For example, e-money payment and ID authentication. These products can be set up easily in a wide range

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-10-09 02:37:31
365Computer security / ISO standards / Ubiquitous computing / Security token / PKCS / Two-factor authentication / Smart card / Pre-boot authentication / PKCS11 / Cryptography / Cryptography standards / Security

End Point Security DigiSAFE KeyCrypt Features & Benefits Security

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:53
366Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-11 18:21:13
367McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
368Internet protocols / HTTP / Two-factor authentication / Authentication / Password / Access token / Basic access authentication / One-time password / Security token / Security / Computer security / Access control

ePass OTP Authentication System White Paper ePass OTP Authentication System White Paper

Add to Reading List

Source URL: www.rs-computer.com

Language: English - Date: 2009-12-15 09:43:31
369McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
370Smartphones / Card reader / Smart card / Computing / Computer hardware / Technology / USB / ISO standards / Ubiquitous computing

H-Token H103 - MarcoPolo TM The H-Token H103 MarcoPolo is a high-security storage device equipped with an internal Smart Card, an integrated keypad, an integrated high-resolution color display and an ID1 contact Smart Ca

Add to Reading List

Source URL: www.eisst.com

Language: English
UPDATE