Security token

Results: 1367



#Item
871Anakam / Two-factor authentication / Multi-factor authentication / Authentication / AKA / Password / Data security / Biometrics / Security token / Security / Access control / Cryptography

Progressive authentication integrated into Equifax Identity Proofing  R eal time fraud prevention at registration, login, and other transactions.

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2014-03-25 15:20:21
872Identity management / Superuser / System administration / Password / User / Authentication / Security token / Information security / Principle of least privilege / Security / Computer security / Access control

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-013

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-07 15:28:05
873Identity management / Security token / One-time password / Electronic authentication / Authentication / Multi-factor authentication / Password / Identity assurance / Replay attack / Security / Computer security / Cryptography

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-006

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-08-15 15:51:22
874Identity management / Security token / One-time password / Electronic authentication / Authentication / Multi-factor authentication / Password / Identity assurance / Challenge-response authentication / Security / Computer security / Access control

ANDREW M. CUOMO Governor STATE OF NEW YORK State Capitol P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-08-15 15:51:07
875One-time password / Security token / Two-factor authentication / Malware / Transaction authentication number / Online banking / Man-in-the-browser / Dropbox / Twitter / Computing / Software / Computer security

Intel® Technology Journal | Volume 18, Issue 4, 2014 Security Analysis of Mobile Two-Factor Authentication Schemes Contributors Alexandra Dmitrienko

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-08-06 03:20:34
876Identity management / Superuser / System administration / Password / User / Authentication / Information security / Security token / Principle of least privilege / Security / Computer security / Access control

ANDREW M. CUOMO Governor STATE OF NEW YORK State Capitol P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-10-07 15:28:19
877Surveillance / Automatic identification and data capture / Identification / Two-factor authentication / Password / Authentication / Speaker recognition / Security token / Iris recognition / Security / Biometrics / Access control

Are PASSWORDS BECOMING A THING of the

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2014-08-04 17:10:26
878EMC Corporation / SecurID / Identity management / One-time password / Two-factor authentication / Password / Access control / Access token / Login / Security / Computer security / Advanced Encryption Standard

Alert[removed]: Incident Prevention and Detection: Protecting Information Security of National Banks

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2014-11-23 08:48:17
879Authentication / Software token / Security / Security token / Cryptography

Impacts of NIST Standards and Specifications Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division [removed]

Add to Reading List

Source URL: idmanagement.gov

Language: English - Date: 2014-05-07 16:33:16
880Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
UPDATE