Security token

Results: 1367



#Item
41FORGEROCK ACCESS MANAGEMENT DATASHEET  ®

FORGEROCK ACCESS MANAGEMENT DATASHEET ®

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-07-19 20:01:17
42Mobile multifactor security  A revolution in authentication and digital signing Mobile multifactor security

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
43ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
44Aintree NHS – Case Study  Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
45An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
46Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel  One Laptop per Child

Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
47IdenTrust™ Trust Gate  www Tr

IdenTrust™ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
48eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG  E-banking is an important service

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
49Demo: User Identification and Authentication with Capacitive Touch Communication †  Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Demo: User Identification and Authentication with Capacitive Touch Communication † Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-07-09 23:12:27
50Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36