Token

Results: 2997



#Item
731Cryptographic protocols / Electronic commerce / Secure communication / Smart cards / Payment systems / Security token / HTTP Secure / Password / Phishing / Computing / Security / Internet

Secure Confirmation of Sensitive Transaction Data in Modern Internet Banking Services* Thomas Weigold IBM Research - Zurich Abstract— In recent years attacks on Internet banking services

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2012-07-04 04:10:11
732Security / Computer security / Cyberwarfare / Security token / Cryptographic protocols / Public-key cryptography / X.509

           

Add to Reading List

Source URL: download.nabto.com

Language: English - Date: 2015-05-07 08:03:02
733Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
734Grimsby / Sea Fish Industry Authority / Fish and chips / National Federation of Fish Friers / Frozen at Sea Fillets Association / Fish fry / French fries / Casino token / Food and drink / Fast food / Fishing in Scotland

Press release from National Fish and Chips AwardsOctoberIT’S THE FRYNAL COUNTDOWN: POPPIES FISH & CHIPS IN SPITALFIELDS, LONDON

Add to Reading List

Source URL: poppiesfishandchips.co.uk

Language: English - Date: 2013-10-15 13:19:00
735Rail transport / Signalling control / Signalman / Token / Railway signal / West Somerset Railway / Railway signalling / Transport / Land transport

WEST SOMERSET RAILWAY PLC INFORMATION FOR VOLUNTEERS DEPARTMENT: Signalmen (we will consider applications from men or women) INTRODUCTION: Signalmen are essential to the operation of the railway: without them no trains c

Add to Reading List

Source URL: westsomersetrailway.vticket.co.uk

Language: English - Date: 2014-04-25 04:24:44
736Internet protocols / One-time password / Two-factor authentication / HOTP / Password / SecurID / Secure Shell / Authentication / Security token / Security / Cryptography / Computer security

Version 1.0 Cornelius Kölbel () MayCC BY-NC-SA 4.0) Everybody knows that a password - be it simple or even complex - is a potential vulnerability. Two factor authentication is the way to authen

Add to Reading List

Source URL: www.linuxtag.org

Language: English - Date: 2014-05-10 10:33:00
737Access token / Computing / Technology / Application programming interface / Technical communication / Representational state transfer

EIDR SYSTEM VERSION 2.0 REGISTRY PROGRAMMER’S GUIDE Jan. 6, 2014 Copyright © by the Entertainment ID Registry Association

Add to Reading List

Source URL: eidr.org

Language: English - Date: 2014-02-06 20:17:44
738

■ Token Ring ■ Le réseau local : Token Ring par Bernard COUSIN

Add to Reading List

Source URL: www.irisa.fr

Language: French - Date: 1999-07-08 05:37:00
    739Password / Keystroke dynamics / Eye tracking / Keystroke logging / Security token / Virtual keyboard / Challenge-response authentication / Partial Password / OTPW / Human–computer interaction / Security / Computing

    Microsoft Word - SOUPSReducing Shoulder-surfing by Using Gaze-based Password Entry _final for publishing_.doc

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2007-05-29 23:54:36
    740Cryptographic software / Software / Privacy software / Cross-platform software / OpenPGP card / GNU Privacy Guard / Security token / Pretty Good Privacy / GPGTools / PGP / Cryptography / Computer security

    Gnuk — An OpenPGP USB Token Implementation Niibe Yutaka <> About Me Contributor to GNU Project

    Add to Reading List

    Source URL: www.gniibe.org

    Language: English - Date: 2014-05-21 01:03:40
    UPDATE