Token

Results: 2997



#Item
761Internet protocols / Security token / ESET NOD32 / One-time password / Two-factor authentication / ESET / Password / RADIUS / Windows Server / Computer security / Computing / Security

ESET_Logo_HorizontalClaim-Gradient-CMYK

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2015-02-12 05:46:28
762Token / Authentication / Security token / Security / Computer security / Access token

High-Integrity Device Authentication at Internet Scale StrongNet™ secures your critical data and mobile devices.  Block sophisticated attacks, including root kits and pass the hash

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2015-04-15 14:34:25
763Identification / Two-factor authentication / Authentication / Password / One-time password / Fingerprint / Security token / Multi-factor authentication / Security / Access control / Biometrics

ID Director for EpicCare August FINAL 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-26 15:54:57
764Bank / Security token / Financial services / Technology / Finance / Bendigo Bank / Online banking / Bendigo

Microsoft Word - OA037adoc

Add to Reading List

Source URL: communitysectorbanking.com.au

Language: English - Date: 2015-01-12 00:01:23
765Software quality / Fuzz testing / Genetic algorithm / Session / Fitness function / Access token / Fitness landscape / Communications protocol / Code coverage / Software testing / Computing / Software engineering

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
766OSI protocols / Network topology / Local area networks / IEEE 802 / Network protocols / Token ring / Ring network / Fiber Distributed Data Interface / Token bus network / Computing / Network architecture / IEEE standards

Real-time communication protocols: an overview∗ Ferdy Hanssen and Pierre G. Jansen October 2003 Abstract This paper describes several existing data link layer protocols that provide

Add to Reading List

Source URL: www.croky.net

Language: English - Date: 2003-11-03 08:20:38
767

人人OAuth2.0 Token 申请单 注意:此表格信息都为必填项,没有的请填无。 申请Token类型:(A/B) A:过期时间1个月的Access Token;

Add to Reading List

Source URL: wiki.dev.renren.com

- Date: 2013-07-29 03:46:53
    768Computer security / Technology / Smart cards / One-time password / Transaction authentication number / Password / Contactless smart card / Subscriber identity module / Security token / ISO standards / Ubiquitous computing / Security

    mobile Solution for e-travel document security exchange

    Add to Reading List

    Source URL: www.monetplus.cz

    Language: English - Date: 2014-12-01 10:30:08
    769Computer network security / Internet protocols / Self-certifying File System / Password authentication protocol / Security token / Kerberos / Access token / Password / RADIUS / Computing / Computer security / Microsoft Windows

    To appear in the 19th ACM Symposium on Operating Systems Principles (SOSP ’03) Decentralized User Authentication in a Global File System Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek MIT Comput

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2003-08-31 20:05:26
    770Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

    TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-07-22 17:40:37
    UPDATE