Security token

Results: 1367



#Item
531Computing / Smart card management system / Smart card / Card reader / Credit card / Gemalto / Two-factor authentication / Security token / Proximity card / Smart cards / Cryptography / Security

Ten Critical Success Factors for Successful Smart Card Projects 2009 – Version 1.0 ©  

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2010-05-31 09:53:05
532Security token / One-time password / Two-factor authentication / Internet protocols / Computer network security / Multi-factor authentication / Password / Authentication / RADIUS / Security / Computer security / Access control

Token-less OTP Authentication Solutions © 2007 – 2015 SyferLock Technology Corporation™ All Rights Reserved. System and Method U.S. Patent nos. 7,143,440 & 7,725,712 Additional U.S. and Foreign Patents and Patents P

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2015-01-22 10:04:27
533Security / Internet protocols / Cryptographic protocols / Kerberos / Password authentication protocol / Mutual authentication / Integrated Windows Authentication / Authentication server / Security token / Computer network security / Computer security / Computing

LNCS[removed]Peer-to-Peer Authentication with a Distributed Single Sign-On Service

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:49:30
534Password / Security token / Password manager / Privileged password management / Computing / Digital press / Portable Document Format

3-Heights™ PDF Security Shell, User Manual

Add to Reading List

Source URL: www.pdf-tools.com

Language: English - Date: 2015-02-16 01:34:37
535Access token / Computer security

MigratoryData Extension API Developer’s Guide and Reference Manual July 2, 2014 2

Add to Reading List

Source URL: www.migratory.ro

Language: English - Date: 2014-07-02 10:02:39
536Portable Document Format / Password / Security token / PDF/A / PDFCreator / Password policy / ISO standards / Computing / Digital press

3-Heights™ PDF Security Service, User Manual

Add to Reading List

Source URL: www.pdf-tools.com

Language: English - Date: 2015-02-16 01:34:38
537Security / Security token / Integrated Windows Authentication / Kerberos / Authentication server / Password authentication protocol / Single sign-on / Digest access authentication / Extensible Authentication Protocol / Computer security / Computer network security / Computing

Peer-to-Peer Authentication with a Distributed Single Sign-On Service ∗ William Josephson Emin G¨un Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:58:13
538Access token / Computer security / Windows XP / Windows NT / Windows Vista / Thread / Windows / Security Support Provider Interface / Security and safety features new to Windows Vista / Microsoft Windows / Computing / System software

Token Kidnapping Cesar Cerrudo Argeniss

Add to Reading List

Source URL: www.argeniss.com

Language: English - Date: 2008-07-29 11:57:50
539Identity management / Password / Security token / Authentication / Transaction authentication number / Password manager / Two-factor authentication / Security / Computer security / Access control

Microsoft Word - Real Time_BP Workflows_Phase II__Oct[removed]final)

Add to Reading List

Source URL: gregmaciag.typepad.com

Language: English - Date: 2011-11-01 10:18:59
540OpenBSM / FreeBSD / Audit trail / Access control / Audit / File system / Access token / Computer security / Computing / Security

FreeBSD Developer Summit TrustedBSD: Audit + priv[removed]November 2006 Robert Watson FreeBSD Project Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-11-13 08:58:21
UPDATE