ActivIdentity

Results: 10



#Item
1

ActivIdentity mini Token AT Спецификация Описание на изделие “ActivIdentity OTP-токен” модель “Mini Token”, версия АТ.

Add to Reading List

Source URL: ibank.rficb.ru

Language: Russian - Date: 2010-08-31 03:29:19
    2Data security / Symantec / Nortel / Verisign / ActivIdentity / Information security / Electronic business / CA Technologies / Anakam / Computing / Technology / Business

    eSecure Systems LLC Data as of    Summary

    Add to Reading List

    Source URL: www.equitynet.com

    Language: English - Date: 2014-05-09 11:03:37
    3Data security / Symantec / Nortel / Information security / ActivIdentity / Verisign / Electronic business / Anakam / Two-factor authentication / Computing / Security / Business

    eSecure Systems, LLC Data as of    Business Analysis

    Add to Reading List

    Source URL: www.equitynet.com

    Language: English - Date: 2015-06-24 18:29:03
    4ActivIdentity / Corporate Ink / Data security / Information security / Identity management / Digital identity / Authentication / Transglobal Secure Collaboration Project / Security / Computer security / Identity

    ActivIdentity Joins TSCP Membership Grows As Solutions Providers Commit to Driving Adoption of Secure Information Sharing Standards HERNDON, Va. (Dec. 1, 2009) ─ ActivIdentity (NASDAQ: ACTI), a global leader in strong

    Add to Reading List

    Source URL: www.tscp.org

    Language: English - Date: 2013-09-16 22:07:51
    5Technology / Assa Abloy / National security / Radio-frequency identification / ISO standards / ActivIdentity / Wireless / Data security / Smart card / Security / Ubiquitous computing / HID Global

    HID Global Government ID Solutions Claudio Perez, Senior Sales Manager Government ID Solutions Latin America

    Add to Reading List

    Source URL: www.icao.int

    Language: English - Date: 2013-07-17 11:23:55
    6Computer network security / National Strategy for Trusted Identities in Cyberspace / Federated identity / OpenID / SAFE-BioPharma Association / HID Global / ActivIdentity / Identity management / Internet privacy / Cryptography / Computer security / Computing

    NSTIC Privacy Workshop Registered Attendees

    Add to Reading List

    Source URL: www.nist.gov

    Language: English - Date: 2011-08-16 09:25:15
    7Identity / Computer network security / ActivIdentity / Identity management / Assa Abloy / Entrust / F-Secure / Trademark / Authentication / Security / Computer security / HID Global

    Microsoft Word[removed]IdenTrust HID Acquisition Press Release.docx

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2014-01-22 14:15:16
    8Cryptography standards / ISO standards / Ubiquitous computing / FIPS 140 / Java Card / ISO/IEC / ActivIdentity / Subscriber identity module / FIPS 201 / Computing / Smart cards / Computer security

    Microsoft Word[removed]ActivIdentity-Applet-v2-for-PIV-Security-Policy-V1.08a.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2008-04-29 01:00:00
    9Computing / Security / Security token / ActivIdentity / FIPS 140 / FIPS 201 / Gemalto / HID Global / Java Card / Cryptography standards / Smart cards / Computer security

    Microsoft Word - FIPS140_SP_ActivIdentity Applet v2.7 on Gemalto IDCore 3020.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-10-24 16:45:11
    10Computer security / Cryptography standards / Giesecke & Devrient / Java Card / Subscriber identity module / FIPS 201 / FIPS 140 / ISO/IEC / ActivIdentity / Smart cards / Security / Cryptography

    Microsoft Word - Sunflower 3_2 AI Applet v2.6.2b Security Policy Card_v1.2 Final_PDM1.1.doc

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-01-04 15:40:58
    UPDATE