Token

Results: 2997



#Item
641Electronic engineering / Internet / RADIUS / Videotelephony / Network access server / Access token / H.323 / Authentication / Internet protocols / Computing / Internet standards

PortaSwitch: External System Interfaces Guide MR45

Add to Reading List

Source URL: portaone.com

Language: English - Date: 2015-01-23 05:56:49
642Token / Railway signal / Interlocking / Rowsley / Signalling block system / Bacchus Marsh railway station / Ballan railway station / Railway signalling / Rail transport / Bacchus Marsh /  Victoria

Rowsley - Ingliston ROWSLEY (34 MILES 15 CHAINS 83 LINKS1890

Add to Reading List

Source URL: www.vrhistory.com

Language: English - Date: 2005-09-20 04:00:17
643HTTP cookie / Internet privacy / Session ID / Session / Computer security / Network architecture / Access token / Security token / Load balancing / Network protocols / Computing / HTTP

Hacking Web Applications Using Cookie Poisoning Amit Klein () is security group manager for Sanctum, Inc. Summary Cookie poisoning is a known technique mainly for achieving impersonation and brea

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 15:05:36
644Two-factor authentication / Security token / Certificate authority / SecurID / Proxy server / Cryptography / Public-key cryptography / Key management

PorKI: Portable PKI Credentials via Proxy Certificates? Massimiliano Pala, Sara Sinclair, and Sean W. Smith Computer Science Department PKI/Trust Lab, Dartmouth College 6211 Sudikoff, Hanover, NH 03755, US

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-10-11 07:49:24
645Security token / One-time password / Two-factor authentication / EAuthentication / Password / Software token / Authentication / Phishing / Password manager / Security / Computer security / Access control

eAuthentication today, Arnnei Speiser, Mega AS Consulting Ltd, July 2006

Add to Reading List

Source URL: www.megaas.com

Language: English - Date: 2008-09-21 15:42:07
646Settlers of Catan / Ashta Chamma / Tock / Games / Token coin / Tokens

TRIARCHY Triarchy is a two or three player game of maneuver and strategy by Beau Beckett Since ancient times along the Nile, the Eye, Scarab and Snake vie for positional advantage. Yet, they are not completely in control

Add to Reading List

Source URL: www.bluepantherllc.com

Language: English - Date: 2010-04-02 20:39:11
647Thirty-one

6 Token Tenure and PATCH: A Predictive/Adaptive Token-Counting Hybrid ARUN RAGHAVAN, COLIN BLUNDELL, and MILO M. K. MARTIN University of Pennsylvania

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2010-10-06 08:46:51
    648Computing / Security token / Universal Serial Bus / Cloud computing / Authentication / Security / VM / Software

    Information at all.nethttp://all.net/

    Add to Reading List

    Source URL: all.net

    Language: English - Date: 2013-07-10 14:10:02
    649Security token / Two-factor authentication / Password / Transaction authentication number / Multi-factor authentication / SMS / Authentication / Phishing / Access token / Security / Computer security / Access control

    Whitepaper MODERN THREATS DRIVE DEMAND FOR

    Add to Reading List

    Source URL: www.aquion.com.au

    Language: English - Date: 2014-07-14 19:32:15
    650Access token / Computer security

    MigratoryData Extension API Developer’s Guide and Reference Manual July 2, 2014 2

    Add to Reading List

    Source URL: migratorydata.com

    Language: English - Date: 2014-07-02 10:02:39
    UPDATE