Security token

Results: 1367



#Item
31plug´n´trust  plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

plug´n´trust plug´n´trust© Just like the other charismathics products, plug´n´trust© is an easy to use, flexible and inexpensive product to fit your demands for all identity management purposes, such as certific

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2011-01-27 05:18:57
32Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

Add to Reading List

Source URL: paiement.systempay.fr

Language: English - Date: 2015-12-16 04:48:58
33Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Changing keys with just a click POWERcoder As a prepayment site expands, there is often the need to generate key change tokens, to change the supply group code or the tariff index. Traditionally, this has required access

Add to Reading List

Source URL: www.conlog.co.za

Language: English - Date: 2015-11-26 07:18:35
34Emerald Insight  Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Emerald Insight Access Tokens – An Administrator’s Guide This document provides an overview of access tokens, including: ‘what is an access token and why do I need one?’, in addition to guidance on how to activa

Add to Reading List

Source URL: www.emeraldgrouppublishing.com

Language: English - Date: 2015-11-25 03:54:07
35Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Security Measures of Trading System AyersGTS’s underlying software architecture is supported by a Security Server which provides (a) user authentication by login mechanism; (b) maintains session’s validity; (c)functi

Add to Reading List

Source URL: www.hkfoundersc.com

Language: English - Date: 2015-06-22 02:44:30
36Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann . Markus Hertlein . Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertlein

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-11-20 14:35:18
37Smartphones Editor: Roy Want n Google n  Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Smartphones Editor: Roy Want n Google n Personal TouchIdentification Tokens Tam Vu and Marco Gruteser

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2013-04-18 23:09:49
38Steps for first authentication in Alpha Click using a security device (token) Step 1 Access www.alphaclick.ro and select the option Login.

Steps for first authentication in Alpha Click using a security device (token) Step 1 Access www.alphaclick.ro and select the option Login.

Add to Reading List

Source URL: www.alphaclick.ro

- Date: 2014-03-26 08:36:50
    39Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

    Initial Settings from smartphone  ■Initial Settings from Android smartphone/tablet PC  1. Turn on the Product  Insert the Product into a device (e.g. digital still camera) which is compatible

    Add to Reading List

    Source URL: www.toshiba.co.jp

    Language: English - Date: 2013-07-31 22:51:17
    40+entrust.com/enterprise Entrust IdentityGuard for Enterprise

    +entrust.com/enterprise Entrust IdentityGuard for Enterprise

    Add to Reading List

    Source URL: www.entrustdatacard.com

    Language: English - Date: 2016-02-11 14:34:23