Software token

Results: 476



#Item
141Cryptography standards / Trusted computing / Cryptographic software / Trusted Platform Module / Windows XP / PKCS11 / Microsoft CryptoAPI / Security token / Smart card / Microsoft Windows / Cryptography / Computer security

smart security interface virtual smart card Logical Access Client for Trusted Platform Modules Windows, Linux, Mac

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:48:12
142Security token / Ubiquitous computing / PKCS / Smart card / Unified Extensible Firmware Interface / Single sign-on / Windows XP / Public key infrastructure / Cryptography / Public-key cryptography / Cryptography standards

smart security interface all platforms one software for all

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2013-11-21 10:47:48
143Java platform / Directory services / Federated identity / OpenSSO / Internet protocols / Oracle Corporation / Authentication / Security token / Lightweight Directory Access Protocol / Computing / Software / Java enterprise platform

Oracle OpenSSO Security Token Server Administration Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2010-08-13 18:28:40
144Access token / Computer security / Windows XP / Windows NT / Windows Vista / Thread / Windows / Security Support Provider Interface / Security and safety features new to Windows Vista / Microsoft Windows / Computing / System software

Token Kidnapping Cesar Cerrudo Argeniss

Add to Reading List

Source URL: www.argeniss.com

Language: English - Date: 2008-07-29 11:57:50
145Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-12 20:30:11
146Two-factor authentication / Security token / Password / Authentication / Multi-factor authentication / Software token / Anakam / Password manager / Security / Access control / Computer security

A GUIDE TO PHONE-BASED PASSWORD PROTECTION (SAMPLE CODE INCLUDED) The increasing frequency of password breaches, along with other forms of cyber attack, make strong

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2014-04-22 19:57:52
147Internet protocols / Two-factor authentication / Security token / One-time password / Single sign-on / Multi-factor authentication / Password / Authentication / Identity management / Security / Computer security / Access control

A UBM TECHWEB WHITE PAPER AUGUST 2012 Software-Based Authentication Delivers More Reliable and Less Costly Security With the adoption of mobility and cloud computing, coupled

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2013-01-16 18:01:47
148Two-factor authentication / Security token / One-time password / Authentication / Password / Java Platform /  Enterprise Edition / QR code / Software token / Mobile ticketing / Security / Computer security / Access control

www.ti8m.ch Zürich | Bern ti&m product flyer ti&m secure web

Add to Reading List

Source URL: www.ti8m.ch

Language: English - Date: 2014-08-18 05:04:43
149Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-11 13:07:53
150Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2014-11-12 20:30:11
UPDATE