Strong authentication

Results: 106



#Item
51Security token / Two-factor authentication / One-time password / Software token / Authentication / Password / Strong authentication / Password manager / Anakam / Security / Computer security / Cryptography

Advanced Authentication Methods: Software vs. Hardware

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-26 09:39:23
52Technology / Economics / Mobile payment / Electronic money / Credit card / Mobile phone / Payment card / Micropayment / Payment / Payment systems / Electronic commerce / Business

Dear Sir/Madam: We have developed and are presently deploying in Canada an open-loop mobile payments system, which uses cash as its core payment engine. We use strong authentication of users but allow for anonymous tra

Add to Reading List

Source URL: fedpaymentsimprovement.org

Language: English - Date: 2013-12-20 14:29:25
53One-time password / Password / Keystroke logging / Two-factor authentication / Salt / Transaction authentication number / Malware / Key derivation function / Password cracking / Security / Computer security / Cryptography

How does two-factor authentication protect my users? Passwords are not strong enough for secure authentication on the web anymore. Even with complicated requirements and heavy hashing, passwords remain vulnerable to comm

Add to Reading List

Source URL: getclef.com

Language: English - Date: 2015-04-10 13:24:37
54Security token / Single sign-on / One-time password / Password / QR code / Authentication / Keystroke logging / Two-factor authentication / Password manager / Security / Computer security / Access control

Strong authentication via QR Code With Evidian QRentry™, your users authenticate with a QR Code™ and their smartphone. The QRentry™ solution allows authenticating with a browser on a web portal or on Windows from

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2015-03-09 12:43:08
55Identity management / Security token / Password / Authentication / Multi-factor authentication / One-time password / Strong authentication / Two-factor authentication / Password manager / Security / Computer security / Access control

Microsoft Word - Authentication Manager-39 A2 79LV 04.doc

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2013-06-26 02:06:21
56Computer crimes / Password / Passphrase / Keystroke logging / Crypt / Brute-force attack / Key derivation function / Transaction authentication number / Phishing / Cryptography / Security / Computer security

Proc. HotSec ’07 Do Strong Web Passwords Accomplish Anything? Dinei Florencio,

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-11-29 12:03:58
57Cryptographic protocols / Internet protocols / IPsec / MD5 / Daemon / Ping / Transmission Control Protocol / HMAC / Communications protocol / Computing / Data / Information

Microsoft Word - IPVS syncd strong authentication extension.doc

Add to Reading List

Source URL: www.keepalived.org

Language: English - Date: 2014-01-28 06:52:40
58Security / Cloud computing / McAfee / Identity management system / Single sign-on / Two-factor authentication / Security token / Security Assertion Markup Language / Software as a service / Computing / Identity management / Computer security

Data Sheet McAfee Cloud Single Sign On, SaaS Edition Identity management in the cloud, for the cloud Single sign-on (SSO), automated account provisioning/deprovisioning, and strong

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:40
59Internet / Computing / Internet protocols / Internet standards / HTTP / HTTP Secure / HTTP cookie / Man-in-the-middle attack / Certificate authority / Cryptography / Cryptographic protocols / Secure communication

Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web Michael Dietz Rice University Alexei Czeskis

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-03-21 17:06:14
60Two-factor authentication / Security token / Authentication / Intelligent Nation / One-time password / Strong authentication / Password / Federated identity / Anakam / Security / Cryptography / Computer security

FACT SHEET (May[removed]National Authentication Framework The National Authentication Framework (NAF) seeks to realise the vision of the iN2015 masterplan for a secure and trusted enabling infocomm infrastructure that can

Add to Reading List

Source URL: www.ida.gov.sg

Language: English - Date: 2012-10-04 21:31:28
UPDATE