Security token

Results: 1367



#Item
831Information security / Remote access / Access token / Access control / Email / Virtual private network / Computer security / Security / Computing

Rutland Regional Health Services

Add to Reading List

Source URL: www.rrmc.org

Language: English - Date: 2013-12-19 17:09:00
832Army Knowledge Online / Public key certificate / Security token

Microsoft Word - AKO Registration FAQ.docx

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-08-16 11:03:12
833Security / Technology / ISO standards / Security token / Card reader / Java Card / Bluetooth / Two-factor authentication / Multi-factor authentication / Computing / Smart cards / Ubiquitous computing

Abstract: While mobile handheld devices provide productivity benefits, they also pose new risks

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
834Access control / Identity management / Security Assertion Markup Language / Security token / OpenID / Authenticator / Authentication / Single sign-on / Security / Computer security / Federated identity

UAF Architectural Overview

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:51
835Internet / Security / Data security / Apple ID / Security token / Password / Email / Computing

Mysunlife.ca – Registering online! Questions?

Add to Reading List

Source URL: www.cie.utoronto.ca

Language: English - Date: 2013-08-08 10:42:10
836Identity / Smart cards / ISO standards / Ubiquitous computing / FIPS 201 / Security token / Identity theft / Credential / Identity document / Security / Cryptography / Identity management

PIV-I White Paper - FINAL[removed]clean

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2011-01-13 10:42:56
837Fog Investigation and Dispersal Operation / Two-factor authentication / Authentication / Security token / Fido / Security / Access control / Authenticator

UAF Authenticator Commands

Add to Reading List

Source URL: fidoalliance.org

Language: English - Date: 2014-02-10 21:58:49
838ISO standards / Ubiquitous computing / Smart cards / Credential / Security token / Proof of knowledge / MULTOS / Public-key cryptography / IP / Cryptography / Cryptographic protocols / Identity management

Integration of hardware tokens in the Idemix library? Antonio de la Piedra Radboud University Nijmegen, ICIS DS, Nijmegen, The Netherlands [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 08:45:18
839Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: www.ands.org.au

Language: English - Date: 2011-09-25 21:47:49
840OAuth / Computer security / Security / Federated identity / Access token / OpenID / .tel / Identity management / Social login / Cloud standards / Computing / Internet protocols

Microsoft Word - OAuth-4.docx

Add to Reading List

Source URL: dev.telnic.org

Language: English - Date: 2014-09-26 07:17:27
UPDATE