Token

Results: 2997



#Item
561Computer network security / Password / Authentication / Biometrics / Two-factor authentication / Security token / Security / Computer security / Access control

INDISTINGUISHABLE FROM MAGIC Is Secure and Usable Smartphone Authentication Asking Too Much?

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2015-05-18 18:23:42
562Smart card / Computing / Identity management / Security token / USB / Computer hardware / Two-factor authentication / Universal Serial Bus

m-Identity Protection mini Smart card security for the mobile

Add to Reading List

Source URL: www.kobil.com

Language: English - Date: 2015-04-27 11:52:43
563Cryptographic protocols / HTTP / Password / Challenge-response authentication / Two-factor authentication / Security token / Digest access authentication / Cryptographic nonce / Authentication / Security / Cryptography / Computer security

CHAPTER 3 Protocols It is impossible to foresee the consequences of being clever.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:54
564Computer security / Security token / One-time password / Fortinet / Two-factor authentication / Cisco IOS / Android / Password / IOS / Computing / Smartphones / System software

FortiToken Mobile TM One-Time-Password Application Superior Strong Authentication Using Your Smartphone FortiToken Mobile is an OATH compliant, time-based One-Time-Password (OTP)

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:14
565Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-03-09 14:36:12
566Road transport / Traffic / Traffic law / London Underground / Token / Transport / Land transport / Road safety

The rail industry’s confidential reporting system Freight Operation Reports Periods 5 andJuly – 13 September 2014)

Add to Reading List

Source URL: www.ciras.org.uk

Language: English - Date: 2014-10-13 05:51:32
567One-time password / Fortinet / Two-factor authentication / Password / Random password generator / Security / Computer security / Cryptography

FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:06
568Two-factor authentication / Multi-factor authentication / Password / Biometrics / Authentication / Identity management / Mobile business intelligence / Security token / Security / Access control / Computer security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
569One-time password / Fortinet / Two-factor authentication / Password / Random password generator / Security / Computer security / Cryptography

FortiToken -200CD TM One-Time Password Token Strong Authentication at Your Fingertips The OATH compliant, time-based One-Time-Password (OTP) FortiToken-200CD is

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:06
570Physics / Security token / Quantum channel / Quantum cryptography / Cryptography / Computational complexity theory / Theoretical computer science / Applied mathematics / Quantum information science

Microsoft PowerPoint - Broadbent-QOTP-Paris-for-posting.pptx

Add to Reading List

Source URL: www.pcqc.fr

Language: English - Date: 2015-04-05 22:49:05
UPDATE