Security token

Results: 1367



#Item
671Authentication / Notary / Packaging / Password / Biometrics / Strong authentication / Two-factor authentication / Security token / Security / Cryptography / Access control

IdentityX Joins FIDO Alliance Board Company Joins Industry Leaders to Create a More Secure Digital Presence for Consumers Fairfax, VA and Mountain View, CA – March 6, 2014 – The FIDO (Fast IDentity Online) Alliance (

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-03-06 01:24:20
672Film / Authentication / Password / Bank of America / Online banking / Smart card / Fido / Security / Technology / Security token

  FOR RELEASE; The FIDO Alliance Welcomes Global Financial Leader Bank of America to the Board of Directors Mountain View, CA. – February 25, 2014 – The FIDO (Fast IDentity Online) Alliance (http://www.fidoalliance

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-25 13:46:02
673Computer security / Computer network security / Crime prevention / Entrust / National security / Security token / Two-factor authentication / Identity management / Mobile device management / Electronic commerce / Technology / Security

Mobile Security Solutions Securing & Leveraging the Mobile Enterprise The proliferation of mobile devices is front and center for virtually all organizations, in both employee and customer communities. Within the enterpr

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:48:20
674Microsoft CryptoAPI / Cryptographic Service Provider / PKCS11 / FIPS 140-2 / Security token / CSSM / PKCS / BATON / Application programming interface / Cryptography / Cryptography standards / Cryptographic software

A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
675Computer network security / Federated identity / Two-factor authentication / Extensible Authentication Protocol / Authentication / Security token / One-time password / Password / Challenge-response authentication / Computer security / Security / Computing

The Evolution of Authentication The Role of Secure Hardware in Overcoming Authentication Challenges Dr. Rolf Lindemann, FIDO Alliance [removed[removed]Middlefield Road Palo Alto

Add to Reading List

Source URL: johnlyle.com

Language: English - Date: 2013-07-18 11:51:33
676Samsung Electronics / Videotelephony / Security token / PayPal / Authentication / Samsung / FIDO / Technology / Security / Business

The FIDO Alliance Appoints Samsung Electronics to the Board of Directors Mountain View, CA. and Seoul, Korea – April 22, 2014 – The FIDO (Fast IDentity Online) Alliance (http://www.fidoalliance.org/), an industry con

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-04-21 22:38:09
677Password / Security token / One-time password / Authentication / Password manager / Two-factor authentication / Security / Access control / Computer security

Authentication: "I Know You" Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds Summary:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
678Notary / Packaging / Security token / Password / Multi-factor authentication / Identity management / Information security / Biometrics / Smart card / Security / Access control / Authentication

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 12:08:35
679Computer network security / Data security / Identity / Spamming / Security token / Authentication / Cloud computing / Digital identity / Phishing / Security / Computer security / Identity management

Technology Strategy Board Driving Innovation Ensuring trust in digital services

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-10-10 06:18:10
680Internet privacy / Network architecture / Two-factor authentication / Security token / Virtual private network / Secure Shell / Authentication / Password / Junos / Security / Computer network security / Computer security

Securing your Juniper SSL VPN with two-factor authentication. Protecting Your

Add to Reading List

Source URL: www.duosecurity.com

Language: English - Date: 2014-08-13 11:23:25
UPDATE