Multi-factor authentication

Results: 297



#Item
1

en19 Original Article Behavioural Biometrics for Multi-Factor Authentication in Biomedicine

Add to Reading List

Source URL: www.ejbi.org

Language: English - Date: 2017-06-28 11:47:41
    2

    CLAVISTER Multi Factor Authentication F E AT U R E S ƒƒ strong

    Add to Reading List

    Source URL: www.hermitage.be

    Language: English - Date: 2017-11-09 05:58:22
      3

      Selecting a Cloud Provider Checklist (Please also check our Selecting Practice Management Software checklist) Security Does the cloud provider offer multi-factor authentication? Does the cloud provider have a firewall?

      Add to Reading List

      Source URL: www.azbar.org

      - Date: 2017-05-17 18:29:57
        4

        A Modular Framework for Multi-Factor Authentication and Key Exchange? Nils Fleischhacker1 , Mark Manulis2 , and Amir Azodi3 1 2

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-09-17 07:10:18
          5

          Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright © 2015 Centrify Corporation. All Rights Reserved.

          Add to Reading List

          Source URL: res.cdn.sys-con.com

          - Date: 2016-11-15 09:40:01
            6

            Multi-Factor Authentication: Security or Snake Oil? Steven Myers Rachna Dhamija Jeffrey Friedberg

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            - Date: 2007-07-24 11:28:38
              7Computer access control / Computer security / Computing / Single sign-on / Multi-factor authentication / Authentication / OAuth / Mobile app / Electronic authentication / Accounts & SSO

              PROJECT DESCRIPTION MOBILE APPLICATION SINGLE SIGN-ON For Public Safety and First Responders

              Add to Reading List

              Source URL: nccoe.nist.gov

              Language: English - Date: 2016-07-28 08:23:01
              8Computing / Security / Computer network security / Cybercrime / Data security / Computer security / Cryptography / Secure communication / Cloud computing / Multi-factor authentication / De-perimeterisation

              Two Factor Authentication: Security in an Age of Zero Trust Jon Oberheide, CTO, Duo Security Not-so-surprising trends  Cloud

              Add to Reading List

              Source URL: jon.oberheide.org

              Language: English - Date: 2015-10-18 22:20:40
              9Computer access control / Computer security / Cryptography / Technology / Multi-factor authentication / Authentication / Smart card / Mobile phone / Truphone / Subscriber identity module / Electronic authentication / Security token

              ConsentID_datasheet1.indd

              Add to Reading List

              Source URL: www.aeteurope.com

              Language: English - Date: 2016-03-09 10:47:55
              10Cryptography / Computer access control / Public-key cryptography / Key management / Transport Layer Security / Public key infrastructure / Multi-factor authentication / One-time password / Authentication / Security token / Identity management system / Public key certificate

              plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

              Add to Reading List

              Source URL: planc.biz

              Language: English - Date: 2011-01-27 05:18:57
              UPDATE