Token

Results: 2997



#Item
241Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth

Advanced Message Queuing Protocol (AMQP) Claims-based Security Version 1.0 Working DraftAugust 2013

Add to Reading List

Source URL: www.oasis-open.org

Language: English
242Computer access control / Computer security / Cryptography / Technology / Multi-factor authentication / Authentication / Smart card / Mobile phone / Truphone / Subscriber identity module / Electronic authentication / Security token

ConsentID_datasheet1.indd

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:55
243Economy / Financial services / Computer access control / Finance / Online banking / Banking / Security token / Bank / Smart card / Direct bank / Authentication / Industrial and Commercial Bank of China

A new trend in China Easy and secure e-banking for everybody ICBC bank The challenge

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:37
244Ancient inventions / Rivers of Kent / Watermill / Water wheel

Design and make a model watermill Win £100 or a book token, or cash prizes Toton had a watermill to grind wheat into flour. There is no photo or drawing of the mill. Can you design and make a model to suggest what Toton

Add to Reading List

Source URL: totonunearthed.org.uk

Language: English - Date: 2015-06-02 07:51:54
245Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
246Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
247Domain name system / Internet / Computing / Network architecture / Internet Standards / Internet protocols / Domain registration / Domain name / Name server / Domain name registrar / WHOIS

 SectionQuery domain name details using token addedWhitelist IP addresses for DRS-EPP access moved to Chapter 3 Admin user, in line with the whitelisting functionality being linked to the role of admin

Add to Reading List

Source URL: nic.amsterdam

Language: English - Date: 2016-06-09 09:47:38
248Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
249Computer access control / Computer security / Access token / Token / Security / Access control / Security token / RSA SecurID

Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Add to Reading List

Source URL: www.emeraldgrouppublishing.com

Language: English - Date: 2015-11-25 03:54:07
250Computer access control / Cryptography / Computer security / Computing / Password / Security token / Login / Session / Password manager / Self-service password reset

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
UPDATE