Security token

Results: 1367



#Item
971Computer network security / Federated identity / Access control / Authentication / Notary / Packaging / Kerberos / Security token / XML Signature / Computer security / Security / Cryptography

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2000-12-06 21:08:24
972Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-11-30 10:12:40
973Multi-factor authentication / Two-factor authentication / Security token / Authentication / Password / One-time password / Mutual authentication / Online banking / Information security / Security / Access control / Computer security

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room 3086 • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Authentication in an Internet Banking E

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-06 11:47:52
974Computer security / FIPS 140-2 / Niels Ferguson / National Security Agency / Entropy / Security token / FIPS 140 / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Pseudorandom number generators / Cryptography standards

SPYRUS Encryption Products are Resistant to Attacks on Dual_EC_DRBG Random Number Generation The New York Times recently reported that the NSA may have inserted an intentional "backdoor” weakness in an encryption algor

Add to Reading List

Source URL: www.spyrus.com

Language: English - Date: 2014-01-06 15:57:43
975WS-SecureConversation / WS-Trust / WS-Security / Security token / Access token / Web Services Description Language / WS-SecurityPolicy / Web Services Enhancements / Computer security / Security / Computing

Web Services Secure Conversation Language (WS-SecureConversation) February 2005 Authors Steve Anderson, OpenNetwork Jeff Bohren, OpenNetwork

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2005-07-15 03:44:24
976Key management / Electronic signature / Digital signature / Authentication / Signature / Electronic Signatures in Global and National Commerce Act / Public key certificate / Security token / Non-repudiation / Cryptography / Notary / Public-key cryptography

Empire State Plaza P.O. Box 2062 Albany, NY[removed]www.its.ny.gov ANDREW M. CUOMO

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2013-12-26 11:54:52
977Multi-touch / Apple Inc. / IOS / IPhone / Smartphones / Apple ID / Security token / IPod Touch / IPad / Computing / Software / ITunes

iOS Security February 2014 White Paper iOS Security

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2014-02-26 14:21:04
978Computing / Software / System software / Security token / User interface techniques / Password / Form

Instructions to set up ID 1. Open your web browser. 2. Go to https://ncid.nc.gov. 3. Click on the First Time NCID User link.

Add to Reading List

Source URL: www.ncosc.net

Language: English - Date: 2011-02-25 09:58:35
979Narrative / Style / Security token / Password / Stack / Literature / Cognition / Alternate reality / Munged password / Semiotics / Fiction / Fiction-writing mode

Towards Narrative Authentication Or, Against Boring Authentication Anil Somayaji David Mould

Add to Reading List

Source URL: www.nspw.org

Language: English - Date: 2014-01-06 10:11:33
UPDATE