Software token

Results: 476



#Item
301Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2013-02-13 11:02:58
302Cryptography / Cryptographic software / Password / Security token / Salt / S/KEY / Privileged password management / One-time password / Security / Computer security / Access control

Authenticating Mobile Device Users Through Image Selection1 Wayne Jansen The National Institute of Standards and Technology Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
303Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: piotrkosoft.net

Language: English - Date: 2014-10-30 12:02:31
304Windows NT / Computer network security / Windows Server / Entrust / National security / Security token / Windows Vista / Encrypting File System / Security and safety features new to Windows Vista / Microsoft Windows / Software / Computing

Entrust Entelligence Security Provider

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:48:03
305One-time password / Security token / Two-factor authentication / Malware / Transaction authentication number / Online banking / Man-in-the-browser / Dropbox / Twitter / Computing / Software / Computer security

Intel® Technology Journal | Volume 18, Issue 4, 2014 Security Analysis of Mobile Two-Factor Authentication Schemes Contributors Alexandra Dmitrienko

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-08-06 03:20:34
306Authentication / Software token / Security / Security token / Cryptography

Impacts of NIST Standards and Specifications Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division [removed]

Add to Reading List

Source URL: idmanagement.gov

Language: English - Date: 2014-05-07 16:33:16
307Compiler construction / Lexical analysis / Parsing / Programming language implementation / Access token / Java / Computing / Software engineering / Software

Additional NLS Tools • • • •

Add to Reading List

Source URL: lexsrv3.nlm.nih.gov

Language: English - Date: 2009-11-23 15:35:20
308Computing / Disk encryption / Windows Vista / Security token / Cryptographic software / Pre-boot authentication / FIPS 140 / Smart card / Password / Cryptography / Computer security / Cryptography standards

Microsoft Word - Security Policy 30_Nov_08.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2008-12-16 00:00:00
309Computer file formats / Computing / GRIB / NetCDF / Advanced Weather Interactive Processing System / Computer file / Access token / Meteorology / Atmospheric sciences / Earth sciences graphics software

Processing Local MPE Output For D2D Display Office of Hydrologic Development Hydrologic Software Engineering Branch[removed]

Add to Reading List

Source URL: www.nws.noaa.gov

Language: English - Date: 2012-07-19 09:46:22
310Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ctan.mirrorcatalogs.com

Language: English - Date: 2014-10-30 12:02:31
UPDATE