Security token

Results: 1367



#Item
741ISO standards / FIPS 201 / Standards / Computer security / Smart cards / Security token / Credential / Identity assurance / Electronic authentication / Identity management / Technology / Security

Guidelines for Derived Personal Identity Verification (PIV) Credentials

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-12-19 09:39:39
742Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2014-11-28 16:26:21
743SCIP / Security / Access token / Defense Security Cooperation Agency / Computer security / Secure Communications Interoperability Protocol / Advanced Encryption Standard / EMC Corporation / SecurID

DEFENSE SECURITY COOPERATION AGENCY 201 12m STREET SOUTH, STE 203 ARLINGTON, VA[removed]OCT[removed]MEMORANDUM FOR DEPUTY ASSISTANT SECRETARY OF THE ARMY FOR

Add to Reading List

Source URL: samm.dsca.mil

Language: English - Date: 2014-10-23 13:06:33
744Authentication / Login / Transaction authentication number / Password / Security token / SecurID / Security / Computer security / Access token

Formal specification and verification of control software for cryptographic equipment - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-18 20:05:29
745SecurID / Security / Token / Access token / Computer security / Security token / One-time password / Railway signalling / Advanced Encryption Standard / EMC Corporation

How to Use Your Entrust Token

Add to Reading List

Source URL: www.washington.edu

Language: English - Date: 2014-11-06 12:38:18
746Access control / Two-factor authentication / Security token / Electronic authentication / Authentication / Identity assurance / Credential Service Provider / Credential / Access token / Security / Identity management / Computer security

DOC Document

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-03 16:02:08
747Notary / Digital signature / Electronic signature / Security token / Cryptographic protocol / Non-repudiation / Public key infrastructure / Public key certificate / Blind signature / Cryptography / Public-key cryptography / Key management

Trust Relations in a Digital Signature System Based on a Smart Card Jean-Luc Giraud & Ludovic Rousseau Gemplus, Cryptography & Security Group, B.P. 100, 13881 Gémenos Cedex, France Phone: +[removed]22, +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
748SCIP / Security / Access token / Defense Security Cooperation Agency / Computer security / Secure Communications Interoperability Protocol / Advanced Encryption Standard / EMC Corporation / SecurID

DEFENSE SECURITY COOPERATION AGENCY 201 12m STREET SOUTH, STE 203 ARLINGTON, VA[removed]OCT[removed]MEMORANDUM FOR DEPUTY ASSISTANT SECRETARY OF THE ARMY FOR

Add to Reading List

Source URL: www.samm.dsca.mil

Language: English - Date: 2014-10-23 13:06:33
749OAuth / Network protocols / Access token / Cross-site request forgery / Session / Internet standards / Security token / RADIUS / Computing / Internet protocols / Cloud standards

RFC[removed]OAuth 2.0 Threat Model and Security Considerations

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-10-05 22:42:14
750Access control / Identity assurance / Two-factor authentication / Credential Service Provider / Security token / Authentication / Electronic authentication / Credential / Information security / Security / Identity management / Computer security

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-03 16:02:04
UPDATE