Tokens

Results: 364



#Item
61

G.P. Hancke, Eavesdropping Attacks on High-Frequency RFID Tokens

Add to Reading List

Source URL: www.rfidblog.org.uk

- Date: 2010-06-30 06:25:06
    62Distributed data storage / File sharing networks / Computing / File sharing / Kademlia / Mnet / Peer-to-peer / Node / Wireless ad hoc network / Routing / Network architecture

    Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail: Abstract

    Add to Reading List

    Source URL: netecon.seas.harvard.edu

    Language: English - Date: 2009-11-30 14:32:02
    63Exonumia / Token coin / Token

    Freading eBooks General Informaon Q: What is Freading? Freading is a new service that allows you to checkout eBooks using virtual credits or “tokens.” As a Shenandoah County Library cardholder, you will receive 5 su

    Add to Reading List

    Source URL: www.shenandoah.co.lib.va.us

    Language: English - Date: 2015-10-28 16:47:20
    64Cookie Monster / Cookies / Monsters / HTTP cookie / Personal life / World Wide Web / Computing

    Verbal Spontaneous Problem Happy (New) Holidays! Procedure: 1. Give each team member 6 cards or other tokens. 2. Team members may respond in any order.

    Add to Reading List

    Source URL: www.missouriodyssey.org

    Language: English - Date: 2015-12-28 00:24:08
    65Computer access control / Exonumia / Token coin / Computer security / Access token / Tamper-evident technology / Prevention / Safety / Cryptography / Security token / RSA SecurID

    Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

    Add to Reading List

    Source URL: www.conlog.co.za

    Language: English - Date: 2015-11-26 07:18:35
    66Computer access control / Computer security / Access token / Token / Security / Access control / Security token / RSA SecurID

    Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

    Add to Reading List

    Source URL: www.emeraldgrouppublishing.com

    Language: English - Date: 2015-11-25 03:54:07
    67Computing / Computer access control / Smartphones / Cloud clients / Personal computing / Information appliances / Security token / Multi-factor authentication / Touchscreen / IPhone / Token / Android

    Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

    Add to Reading List

    Source URL: www.winlab.rutgers.edu

    Language: English - Date: 2013-04-18 23:09:49
    68Internet / Computing / Cryptographic protocols / Cryptography / X.509 / Internet Architecture Board / Housley / Internet Engineering Task Force / S/MIME / IEEE 802.11i-2004

    Mr. Housley is the Founder of Vigil Security, LLC, and he is coauthor of “Planning for PKI” and “Implementing Email and Security Tokens” published by John Wiley & Sons. He has over 30 years of communications and

    Add to Reading List

    Source URL: www.ianacg.org

    Language: English - Date: 2015-02-06 01:41:13
    69Cryptography / Public key infrastructure / Public-key cryptography / Transport Layer Security / Key management / Computer access control / SOA Security / Security Assertion Markup Language / Revocation list / Online Certificate Status Protocol / WS-Security / Certificate authority

    trust claims tokens XML-Encryption

    Add to Reading List

    Source URL: www.soaschool.com

    Language: English - Date: 2013-01-08 15:17:27
    70Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

    trust claims buffer overrun tokens

    Add to Reading List

    Source URL: www.soaschool.com

    Language: English - Date: 2013-01-08 15:17:40
    UPDATE