<--- Back to Details
First PageDocument Content
Randomness / Computing platforms / HOTP / Personalization / One-time password / /dev/random / Cross-platform / USB flash drive / Computing / Device file / Information science
Date: 2012-10-03 05:01:04
Randomness
Computing platforms
HOTP
Personalization
One-time password
/dev/random
Cross-platform
USB flash drive
Computing
Device file
Information science

Cross-platform YubiKey Personalization Tool User Guide Software Version[removed]Document Version 1.1

Add to Reading List

Source URL: www.yubico.com

Download Document from Source Website

File Size: 3,29 MB

Share Document on Facebook

Similar Documents

Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

DocID: 1oc5c - View Document

Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

Yubico Best Practices: OATH-HOTP

DocID: 1nci1 - View Document

One-time password / Internet protocols / HOTP / USB / USB human interface device class / Universal Serial Bus / Two-factor authentication / Human interface device / USB flash drive / Computer security / Computing / Security

The YubiKey Manual Usage, configuration and introduction of basic concepts Version: 3.4 Date: 27 March, 2015

DocID: 1fZMV - View Document

Internet protocols / One-time password / Two-factor authentication / HOTP / Password / SecurID / Secure Shell / Authentication / Security token / Security / Cryptography / Computer security

Version 1.0 Cornelius Kölbel () MayCC BY-NC-SA 4.0) Everybody knows that a password - be it simple or even complex - is a potential vulnerability. Two factor authentication is the way to authen

DocID: 15LKk - View Document

rtIER poEL reAT hoTp D’ ksOR wRAorPP

DocID: 14AM7 - View Document