Security token

Results: 1367



#Item
41Computer access control / Computing / Computer security / Federated identity / Identity management / Free software / Java enterprise platform / OpenAM / Authentication / Single sign-on / ForgeRock / Security token

FORGEROCK ACCESS MANAGEMENT DATASHEET ®

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-07-19 20:01:17
42Computer access control / Computer security / Access control / Multi-factor authentication / One-time password / Security token / Authentication / Mobile security / Password / Electronic authentication / Extensible Authentication Protocol

Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:48:03
43Computer access control / Security / Computer security / Prevention / Multi-factor authentication / Authentication / Security token / ESET / Information security / Access control / Electronic authentication / Strong authentication

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
44Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
45Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
46One Laptop per Child / Software / Computing / System software / Bitfrost / Laptop / Sugar / Security token / Personal firewall / OLPC XS / Hardware restriction

Bitfrost: the One Laptop per Child Security Model Ivan Krsti´c Simson L. Garfinkel One Laptop per Child

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-08 09:53:29
47Cryptography / Computer access control / Certificate authority / Security token / Man-in-the-browser / Multi-factor authentication / Smart card / Authentication / IdenTrust

IdenTrust™ Trust Gate www Tr

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:51:56
48Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Certificate authority / Smart card / Public key certificate / Security token / Authentication / Certificate policy

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:38
49Computing / Consumer electronics / Personal computing / Information appliances / Technology / Smartphones / GPS navigation devices / Personal digital assistants / Tablet computer / Touchscreen / Mobile device / Security token

Demo: User Identification and Authentication with Capacitive Touch Communication † Tam Vu† , Ashwin Ashok† , Akash Baid† , Marco Gruteser† ,

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2012-07-09 23:12:27
50Humancomputer interaction / Computer security / Computer access control / Password / Security / Cybercrime / Security token / Eye tracking / Virtual keyboard / Challengeresponse authentication / Keystroke logging / Keystroke dynamics

Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-05-29 23:54:36
UPDATE