Security token

Results: 1367



#Item
811Security token / Public key certificate

Process flow for verification of member details in respect of claims submitted by ex-employees through his present employer If the member has opted for the present employer for attestation of claim and the member details

Add to Reading List

Source URL: www.epfindia.com

Language: English - Date: 2013-10-04 08:00:59
812World Wide Web / Web 2.0 / IPhone software / Instagram / Facebook / Copyright law of the United States / Copyright / IOS / Access token / Computing / Software / Photo sharing

IOActive Security Advisory Title Facebook Access Token Sent in Plaintext Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
813Password / Token / Access token / Security / Computer security / Login

How-to activate your 4U access token: In order to be able to activate your 4U token on booksandjournals.brillonline.com you need to be registered as a personal user first. If you do not have a personal account yet, pleas

Add to Reading List

Source URL: booksandjournals.brillonline.com

Language: English - Date: 2013-09-05 09:12:37
814Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2013-11-10 10:40:37
815Identity management / Federated identity / Access control / Authentication / Notary / Packaging / Security token / Electronic authentication / Digital identity / Security / Cryptography / Computer security

Authentication in CMS Systems

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2014-04-30 11:23:36
816Two-factor authentication / Security token / Cloud computing / Password authentication protocol / Authentication / Symantec / Password / Software token / AKA / Security / Cryptography / Computer security

SOLUTION BRIEF: FIVE KEY IT CHALLENGES ........................................ Securing the New Enterprise: Five Key IT Challenges

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2013-10-22 08:31:47
817One-time password / Two-factor authentication / Password / Authentication / SMS / Transaction authentication / Phishing / Security token / Mobile banking / Security / Technology / Computer security

` Unlocking the Mobile Security Potential: The Key to Effective Two-Factor Authentication Executive Summary

Add to Reading List

Source URL: www.tyntec.com

Language: English - Date: 2014-03-11 10:59:53
818Technical communication / Security token / Application programming interfaces

Zoompf API Developer Guide API Version 1.0 Revision History May 9, 2013 – Document Created Introduction

Add to Reading List

Source URL: zoompf.com

Language: English - Date: 2013-07-26 19:43:02
819Computer network security / Password / Data security / Two-factor authentication / Online banking / Authentication / Spyware / Security token / Transaction authentication number / Security / Computer security / Espionage

Enjoy the Service 4 Safety Tips Internet banking services have made enormous strides over the past few years and have become

Add to Reading List

Source URL: www.police.gov.hk

Language: English - Date: 2014-05-07 03:19:19
820Cloud storage / Cloud infrastructure / Rackspace Cloud / Cloud API / Security token / Authentication / Access token / Multi-factor authentication / Identity management / Computing / Cloud computing / Security

Cloud Identity Client Developer Guide

Add to Reading List

Source URL: docs.rackspace.com

Language: English - Date: 2014-11-18 21:37:50
UPDATE