Two-factor authentication

Results: 1088



#Item
21How to Configure the Citrix Receiver with Two-Factor Authentication on a personal device

How to Configure the Citrix Receiver with Two-Factor Authentication on a personal device

Add to Reading List

Source URL: employees.dartmouth-hitchcock.org

Language: English - Date: 2014-11-21 16:09:45
    22Using Trusted Execution Environments in Two-factor Authentication: comparing approaches Roland van Rijswijk-Deij1,2 and Erik Poll1 1  Radboud University Nijmegen, The Netherlands

    Using Trusted Execution Environments in Two-factor Authentication: comparing approaches Roland van Rijswijk-Deij1,2 and Erik Poll1 1 Radboud University Nijmegen, The Netherlands

    Add to Reading List

    Source URL: wwwhome.ewi.utwente.nl

    Language: English - Date: 2016-02-02 09:35:49
      23Distributed, Stealthy Brute Force Password Guessing Attempts PASSWORDS14, Trondheim 8 December 2014 Peter N. M. Hansteen BSDly.net <>

      Distributed, Stealthy Brute Force Password Guessing Attempts PASSWORDS14, Trondheim 8 December 2014 Peter N. M. Hansteen BSDly.net <>

      Add to Reading List

      Source URL: home.nuug.no

      Language: English - Date: 2014-12-07 08:01:24
      24User Guide Soft Token on your mobile Page 1 of 7  FransiKey

      User Guide Soft Token on your mobile Page 1 of 7 FransiKey

      Add to Reading List

      Source URL: www.alfransi.com.sa

      Language: English - Date: 2014-04-16 04:49:09
      25ePostoffice User Manual Jan 2015 National Informatics Centre NIC-CISD, Dak Bhawan, New Delhi

      ePostoffice User Manual Jan 2015 National Informatics Centre NIC-CISD, Dak Bhawan, New Delhi

      Add to Reading List

      Source URL: www.epostoffice.gov.in

      Language: English - Date: 2015-01-09 00:00:46
      26yubico cococo Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform

      yubico cococo Configuring a YubiKey for the YubiCloud With the YubiKey Cross-Platform

      Add to Reading List

      Source URL: www.yubico.com

      Language: English - Date: 2015-04-06 10:42:58
      27Intragen Desktop Password Reset for Sun Microsystems Identity Manager Many customers suffer from the cost of large numbers of help desk calls due to forgotten passwords, not to mention the inconvenience to affected users

      Intragen Desktop Password Reset for Sun Microsystems Identity Manager Many customers suffer from the cost of large numbers of help desk calls due to forgotten passwords, not to mention the inconvenience to affected users

      Add to Reading List

      Source URL: www.intragen.com

      Language: English - Date: 2011-03-14 07:51:06
      28User Guide Hard Token Page 1 of 3  FransiKey

      User Guide Hard Token Page 1 of 3 FransiKey

      Add to Reading List

      Source URL: www.alfransi.com.sa

      Language: English - Date: 2014-04-16 04:48:58
      29Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

      Two-factor Authentication: Is the World Ready? Quantifying 2FA Adoption Thanasis Petsas, Giorgos Tsirantonakis, Elias Athanasopoulos, Sotiris Ioannidis Foundation for Research and Technology—Hellas (FORTH), Greece {pet

      Add to Reading List

      Source URL: users.ics.forth.gr

      Language: English - Date: 2015-03-30 04:16:27
      30CASE STUDY: HEALTH CARE  THE BASELLAND CANTONALHOSPITAL IN SWITZERLAND USES MULTI-FACTOR AUTHENTICATION TO PROTECT SENSITIVE PATIENT AND RESEARCH DATA. The Kantonsspital Baselland (Baselland cantonal hospital – KSBL)

      CASE STUDY: HEALTH CARE THE BASELLAND CANTONALHOSPITAL IN SWITZERLAND USES MULTI-FACTOR AUTHENTICATION TO PROTECT SENSITIVE PATIENT AND RESEARCH DATA. The Kantonsspital Baselland (Baselland cantonal hospital – KSBL)

      Add to Reading List

      Source URL: www.smspasscode.com

      Language: English - Date: 2015-05-18 03:07:12