DataLocker, Inc., a leader in hardware-encrypted data protection, today announced that its flagship Sentry 5 encrypted USB ...
This publication presents a methodology for assigning authentication strengths based on the strength of pair wise bindings between the five entities involved in smart card based authentications. Smart ...
The Smart Card Alliance Health Care Council released a new brief today on the rising threat of medical identity theft, calling for the use of two-factor authentication with smart card technology as ...
Crocus Technology announced a prototype of Match in Place (MiP), a distinctive security technique that strengthens user authentication in digital transactions. MiP is specially designed for smart card ...
There are now billions of EMV-enabled cards in the world, but they are not foolproof and can be made more secure through new authentication technologies. In most retailers today, customers don’t swipe ...
VeriSign, Inc., (Nasdaq: VRSN), the leading provider of intelligent infrastructure services for Internet and telecommunications networks, today announced it will enhance its strong authentication ...
ACS reports that is has received orders for more than 60,000 PC smart card readers for use in two-factor authentication by Hong Kong banks. Nine banks are deploying the readers for use with the Hong ...
If you use GPG keys, learn about the benefits to storing them on a smart card. GPG has been around for a long time and is used to secure everything from your email to your software. If you want to ...
SAN FRANCISCO --(Business Wire)-- Apr 22, 2009 Gemalto, the world leader in digital security, has extended its support for strong authentication on the Windows' 7 platform using its .NET Bio solution.
does anyone know of a how-to or something that teaches you how to implement a smart card authentication system for a win2k3 server?<BR><BR>lemme qualify this...<BR><BR>is there any way to use a ...
Authenticating users who log onto your network by account name and password only is the simplest and cheapest (and thus still the most popular) means of authentication. However, companies are ...