Two-factor authentication

Results: 1088



#Item
11Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:20:40
12CASE STUDY  Cyber-security offering strong, cost effective two factor authentication. Small businesses

CASE STUDY Cyber-security offering strong, cost effective two factor authentication. Small businesses

Add to Reading List

Source URL: www.digitalcatapultcentre.org.uk

Language: English - Date: 2016-03-09 06:12:58
13ParentPaperwork Two Factor Authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
14Two-Factor Authentication at TACC Dan Stanzione  CASC HIPAA Working Group – September 2014  TACC and Two-Factor

Two-Factor Authentication at TACC Dan Stanzione CASC HIPAA Working Group – September 2014 TACC and Two-Factor

Add to Reading List

Source URL: casc.org

Language: English - Date: 2014-09-20 14:38:00
15STATE BANK OF INDIA Internet banking services have made enormous strides over the past few years and have become increasingly popular. The introduction of Two-factor Authentication for conducting high-risk retail Interne

STATE BANK OF INDIA Internet banking services have made enormous strides over the past few years and have become increasingly popular. The introduction of Two-factor Authentication for conducting high-risk retail Interne

Add to Reading List

Source URL: www.onlinesbiglobal.com

Language: English - Date: 2012-03-24 07:21:16
    16ONC Data Brief 32, NovemberState and National Trends of Two-Factor Authentication for Non-Federal Acute Care Hospitals

    ONC Data Brief 32, NovemberState and National Trends of Two-Factor Authentication for Non-Federal Acute Care Hospitals

    Add to Reading List

    Source URL: www.healthit.gov

    Language: English - Date: 2015-11-18 11:27:14
      17“They brought in the horrible key ring thing!” Analysing the Usability of Two-Factor Authentication in UK Online Banking Kat Krol, Eleni Philippou, Emiliano De Cristofaro, M. Angela Sasse University College London E-

      “They brought in the horrible key ring thing!” Analysing the Usability of Two-Factor Authentication in UK Online Banking Kat Krol, Eleni Philippou, Emiliano De Cristofaro, M. Angela Sasse University College London E-

      Add to Reading List

      Source URL: discovery.ucl.ac.uk

      Language: English - Date: 2015-07-21 04:21:47
        18Security for an age of zero trust A Two-factor authentication:

        Security for an age of zero trust A Two-factor authentication:

        Add to Reading List

        Source URL: www.ciosummits.com

        Language: English - Date: 2016-01-25 16:20:59
        19OTP Authentication Tokens Wirelessly programmable OTP tokens 01010101100100101101001101110010101011010101010 Key Features •  Strong two-factor authenticator

        OTP Authentication Tokens Wirelessly programmable OTP tokens 01010101100100101101001101110010101011010101010 Key Features •  Strong two-factor authenticator

        Add to Reading List

        Source URL: www.cryptsoft.com

        Language: English - Date: 2016-02-25 10:46:48
          20How to Attack Two-Factor Authentication Internet Banking Manal Adham1 , Amir Azodi1,3 , Yvo Desmedt2,1 , and Ioannis Karaolis1 1  2

          How to Attack Two-Factor Authentication Internet Banking Manal Adham1 , Amir Azodi1,3 , Yvo Desmedt2,1 , and Ioannis Karaolis1 1 2

          Add to Reading List

          Source URL: fc13.ifca.ai

          Language: English - Date: 2013-03-27 20:42:00