Strong cryptography

Results: 135



#Item
91Access control / Password / Passphrase / Password cracking / Password manager / Security / Cryptography / Computer security

Password Policy 1. Purpose: The purpose of this policy is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change of the passwords. 2. Scope: The scope of

Add to Reading List

Source URL: deity.gov.in

Language: English - Date: 2013-11-26 23:29:39
92Internet protocols / Security token / Two-factor authentication / Multi-factor authentication / Authentication / Password authentication protocol / Strong authentication / Initiative For Open Authentication / Anakam / Security / Cryptography / Computer security

OATH FAQ February 20, 2004 OATH FAQ 1. What is OATH?

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:28:37
93Federated identity / Domain name system / Radio-frequency identification / Verisign / IBM Tivoli Access Manager / Two-factor authentication / Authentication / Single sign-on / Identity management / Security / Cryptography / Computer security

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:51
94Password / Two-factor authentication / Authentication / Strong authentication / Personal identification number / Security token / Password manager / Security / Cryptography / Access control

OUCH! | August[removed]IN THIS ISSUE.. • Who Are You • Passwords • Two-Step Verification

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-08-01 12:49:04
95Cryptography / Password / Two-factor authentication / Passphrase / Password policy / Privileged password management / Security / Access control / Computer security

OUCH! | May[removed]IN THIS ISSUE.. • Strong Passwords: Passphrases • Using Passwords Securely • Resources

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-05-06 12:07:06
96Authentication / Notary / Packaging / Multi-factor authentication / Strong authentication / Password / Two-factor authentication / Security token / Security / Cryptography / Access control

Multi-factor Mobile Authentication Ram Ramachandran Program Director, Adv. Technologies IBM Research [removed]

Add to Reading List

Source URL: g3ict.org

Language: English - Date: 2014-06-19 17:40:35
97Security / Cryptography / Smart card / Identification / Electronic commerce / Identity document / Payment systems / Smart card management system / Contactless smart card / Smart cards / ISO standards / Ubiquitous computing

Certificate Services Smart Card Management SMART CARD SOLUTION Smart cards can be used to enhance the security in a company by providing strong authentication for employees or B2B partners. Smart Card Management is an ad

Add to Reading List

Source URL: www.cgi.se

Language: English - Date: 2013-09-05 02:50:27
98Cryptography / Password / Passphrase / Roboform / Password strength / Password policy / Security / Access control / Computer security

techtip Keeping your passwords strong and secure Computer passwords are the keys that “unlock” our computer and

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2013-12-03 11:45:56
99Public key certificate / Certificate authority / Public key infrastructure / X.509 / Certificate policy / Entrust / Web of trust / DigiNotar / WISeKey / Cryptography / Public-key cryptography / Key management

IdenTrust™ Trust Source The Platform for Trusted Identities Benefits Strong Credentials A Trust Source digital

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-04-24 20:49:11
100Public-key cryptography / Key escrow / Strong cryptography / National Security Agency / Escrow / Cipher / Key / Encryption / Export of cryptography in the United States / Cryptography / Key management / Cryptographic software

NL WJC- Kagan Counsel- Box[removed]Folder 005 Encryption bill Technology

Add to Reading List

Source URL: www.clintonlibrary.gov

Language: English - Date: 2014-06-13 22:01:41
UPDATE