Security token

Results: 1367



#Item
521Object-oriented programming / Identity management / Capability-based security / Access Control Matrix / Access token / Principle of least privilege / File system / Class / Computer security / Security / Access control

Practical Least Privilege Security Reader Chapter 7: concept 0.3 Jan[removed]

Add to Reading List

Source URL: polacanthus.net

Language: English - Date: 2008-01-25 08:19:46
522Money / Automatic identification and data capture / ISO standards / Magnetic ink character recognition / Optical character recognition / Typography / Card reader / Two-factor authentication / Security token / Business / Payment systems / Finance

About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification documents. L

Add to Reading List

Source URL: www.vecmar.com

Language: English - Date: 2012-06-14 15:05:23
523Payment systems / Cryptography / Tokenization / Security token / Payment Card Industry Data Security Standard / Card reader / Universal Serial Bus / USB flash drive / Authentication / Security / Computer hardware / Computer security

MagneSafe™ Mini For customers that want both security and ease-of-use, the MagneSafe Mini secure card reader authenticator (SCRA) has the MagneSafe Security Architecture enabled and offers a reliable and convenient sw

Add to Reading List

Source URL: www.magtek.com

Language: English - Date: 2011-09-23 12:16:24
524Smart cards / Payment systems / ISO standards / Ubiquitous computing / Card reader / Cryptographic Service Provider / Personal identification number / Security token / Microsoft CryptoAPI / Microsoft Windows / Computing / Technology

Windows Smart Card Minidriver Specification Version[removed]March 7, 2008 Abstract Smart card vendors can write card minidrivers to present a consistent interface to their smart card type to the Microsoft® Smart Card Base

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-05-22 20:32:53
525Cryptography standards / Trusted computing / Cryptographic software / Trusted Platform Module / Windows XP / PKCS11 / Microsoft CryptoAPI / Security token / Smart card / Microsoft Windows / Cryptography / Computer security

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
526Security token / Ubiquitous computing / PKCS / Smart card / Unified Extensible Firmware Interface / Single sign-on / Windows XP / Public key infrastructure / Cryptography / Public-key cryptography / Cryptography standards

smart security interface all platforms one software for all

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:47:48
527Java platform / Directory services / Federated identity / OpenSSO / Internet protocols / Oracle Corporation / Authentication / Security token / Lightweight Directory Access Protocol / Computing / Software / Java enterprise platform

Oracle OpenSSO Security Token Server Administration Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2010-08-13 18:28:40
528Smart cards / Identity management / ISO standards / Ubiquitous computing / Two-factor authentication / Security token / Windows / Access control / Password / Security / Computing / Microsoft Windows

Chapter 1: Introduction 3 Chapter 1: Introduction 5

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2007-05-07 20:00:00
529Identity / Computer security / ISO standards / Ubiquitous computing / Smart card / Identity management / Identity document / Online identity / Security token / Security / Computer network security / National Strategy for Trusted Identities in Cyberspace

NSTIC: Facts at a Glance 1. What is the NSTIC? The National Strategy for Trusted Identities in Cyberspace (NSTIC) is an Obama administration initiative

Add to Reading List

Source URL: www.smartcardalliance.org

Language: English - Date: 2011-09-01 10:37:00
530Computer security / Security token / HTTP Secure / Password / Authentication / Security / Cryptographic protocols / HTTP

In Carnegie Mellon Computer Science: A 25-Year Commemorative, ed. R. Rashid. ACM Press and Addison-Wesley, 1991, pp[removed]Note: The first printing of this volume had incorrect text due to a production error.) 7 Stro

Add to Reading List

Source URL: tygar.net

Language: English - Date: 2006-03-31 18:50:43
UPDATE