Strong authentication

Results: 106



#Item
81Smart cards / Computer network security / Access control / Entrust / Card reader / Authentication / Credential / Multi-factor authentication / Identity document / Security / Computer security / Identity management

Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc.

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-01-24 11:15:59
82Electronic commerce / Identity management / Smart cards / Access control / Entrust / Authentication / FIPS 201 / Credential / Single sign-on / Security / Computer security / Computing

Strong Identity Authentication for First Responders Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-05-01 11:51:11
83Computer network security / Two-factor authentication / Entrust / Authentication / Challenge-response authentication / Strong authentication / Password / Security token / Security / Cryptography / Computer security

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-03-05 16:58:18
84Anakam / Two-factor authentication / Authentication / Multi-factor authentication / HOTP / Identity management / Transaction authentication number / Security token / SecurID / Security / Computer security / Cryptography

Progressive Authentication­­ — OATH Token Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS),

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
85Security / Cloud computing / McAfee / Identity management system / Single sign-on / Two-factor authentication / Security token / Security Assertion Markup Language / Software as a service / Computing / Identity management / Computer security

Data Sheet McAfee Cloud Single Sign On, SaaS Edition Identity management in the cloud, for the cloud Single sign-on (SSO), automated account provisioning/deprovisioning, and strong

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:40
86Access control / Multi-factor authentication / Authentication / Strong authentication / Identity management / Password / Cryptography / Security / Computer security

IAM Online[removed]pptx

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2013-09-11 14:20:11
87Two-factor authentication / Anakam / Authentication / Multi-factor authentication / Agnitio / Keystroke dynamics / Security / Access control / Biometrics

Progressive Authentication — Voice Biometrics Key benefits > Full compliance with NIST Level 3 requirement for strong two factor authentication, DEA Electronic Prescribing (EPCS)

Add to Reading List

Source URL: www.equifax.com

Language: English - Date: 2012-12-18 10:28:46
88Criminal records / Clarksburg /  West Virginia / Criminal Justice Information Services Division / Criminal investigation / Password / Entrust / Security token / Authentication / Authorization / Security / Computer security / Computer network security

Deploying Advanced Authentication for CJIS Compliance A proven, cost-effective strong authentication approach for law enforcement compliance in the United States

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:51:50
89Computer network security / Internet protocols / Wireless networking / Cryptographic protocols / Extensible Authentication Protocol / Security token / IEEE 802.1X / EAP-SIM / Authentication / Computer security / Computing / Security

An Industry Roadmap for Open Strong Authentication Initiative for Open Authentication An Industry Roadmap for Open Strong Authentication CONTENTS

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:26:56
90Internet protocols / Security token / Two-factor authentication / Multi-factor authentication / Authentication / Password authentication protocol / Strong authentication / Initiative For Open Authentication / Anakam / Security / Cryptography / Computer security

OATH FAQ February 20, 2004 OATH FAQ 1. What is OATH?

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:28:37
UPDATE