Token

Results: 2997



#Item
371Cryptocurrencies / Numismatics / Exonumia / Economy / Money / Token coin / Blockchain / Typetoken distinction / Counterparty

PDF Document

Add to Reading List

Source URL: backfeed.cc

Language: English - Date: 2016-06-17 02:26:05
372Cryptography / Computer access control / Secret sharing / Pico / Authentication / Secure cryptoprocessor / Encryption / Security token / Polynomial / Public-key cryptography

Low-cost Mitigation against Cold Boot Attacks for an Authentication Token Ian Goldberg?1 , Graeme Jenkinson2 , and Frank Stajano2 1 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2016-05-17 22:04:37
373Computer access control / Computer security / Security / Cryptography / Strong authentication / Authentication / Security token / EMV / Phishing / Identity theft / Password / Electronic authentication

EBF_019489 8th February 2016 EBA Discussion Paper on future Draft Regulatory Technical Standards on strong customer authentication and secure communication under the

Add to Reading List

Source URL: www.ebf-fbe.eu

Language: English - Date: 2016-02-10 08:34:16
374

La distribution des @let@token c@let@token o@let@token ul@let@token e@let@token u@let@token rs dans la famille des [scale=0.04]mandm.eps

Add to Reading List

Source URL: printemps-des-sciences.ulg.ac.be

Language: French - Date: 2014-03-27 07:33:33
    375Economy / Finance / Financial services / Credit cards / Investment banks / Primary dealers / HSBC Bank / HSBC / Online banking / Security token / Password / Bank

    sdcscs Personal Internet Banking Maintenance Form Please send form by mail to Contact Centre, HSBC Centre, 18 Cybercity, Ebene, Mauritius Call us onorOr, please visit your nearest HSBC Mauriti

    Add to Reading List

    Source URL: www.hsbc.co.mu

    Language: English - Date: 2015-12-10 00:49:54
    376Computer access control / Hypertext Transfer Protocol / Cryptographic protocols / Password / Security / Authentication / Phishing / HTTP cookie / Cryptographic nonce / Challengeresponse authentication / SQRL / HTTPS

    I bought a new security token and all I got was this lousy phish— Relay attacks on visual code authentication schemes Graeme Jenkinson, Max Spencer, Chris Warrington, Frank Stajano {graeme.jenkinson, max.spencer, chris

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-07-05 13:35:58
    377Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

    Public Comments Received on NIST SP: Electronic Authentication Guideline

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English
    378Computer access control / Password / Authentication / HTTP cookie / Login / Pico / Security token

    Bootstrapping adoption of the Pico password replacement system Frank Stajano, Graeme Jenkinson, Jeunese Payne, Max Spencer, Quentin Stafford-Fraser, Chris Warrington {frank.stajano, graeme.jenkinson, jeunese.payne, max.s

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-08-28 15:17:52
    379Computer access control / Identity management / Federated identity / Cybercrime / Security token / Password / Multi-factor authentication / Electronic authentication / Phishing / Authentication / One-time password / Password policy

    Responsibility and Tangible Security: Towards a Theory of User Acceptance of Security Tokens Jeunese Payne∗ , Graeme Jenkinson∗ , Frank Stajano∗ , M. Angela Sasse† and Max Spencer∗ ∗ University of Cambridge

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2016-05-17 20:42:08
    380Gambling / Gaming / Exonumia / Entertainment / Financial regulation / Casino token / Casino / Money laundering / Token coin

    IMPLEMENTING PROCEDURES ISSUED BY THE FINANCIAL INTELLIGENCE ANALYSIS UNIT IN TERMS OF THE PROVISIONS OF THE PREVENTION OF MONEY LAUNDERING AND FUNDING OF TERRORISM REGULATIONS

    Add to Reading List

    Source URL: www.fiumalta.org

    Language: English - Date: 2016-03-05 01:54:26
    UPDATE