Examples of using Strong authentication in English and their translations into French
{-}
-
Official
-
Colloquial
Version 3.9.2 of 25 October 2011 is the version that was released for the workshop about integrating strong authentication in Internet applications.
Yubico CTO, Jakob Ehrensvärd, is the lead author of the original strong authentication specification that became known as Universal 2nd Factor U2F.
improve your efficiency; but how to implement easily a strong authentication strategy?
mixed with an interoperable identification and strong authentication system.
Alternatively, this process can also be linked to the activation of a strong authentication device, previously given to the user.
applications including the strong authentication process based on the created profiles.
thanks in particular to a strong authentication procedure and military-grade encryption of your information.
At any moment, use your mobile device to easily generate a strong authentication code so you can connect to your SeeZam account in total safety.
HoloSeal ensures the strong authentication based on a unique, highly secure holographic technology.
Thanks to NEVIS, some Internet applications that allow access to the company through strong authentication are already available.
tokenization and strong authentication technologies to ensure security
begins with secured modules, providing strong authentication and protection.
In fact, further investigation showed that the percentage of US government civilian agencies with strong authentication was only at 41.
Imprivata OneSign also supports a range of different strong authentication factors for users.
Simplify multi-factor authentication deployment Evidian Authentication Manager simplifies the deployment and day-to-day management of strong authentication.
including encryption and strong authentication.
Access to PCs and applications can require strong authentication using a smartcard,
We designed tools to link strong authentication with secure elements and service platforms to guarantee simple connectivity
registration intermediary was required, strong authentication was used when delivering the digital certificate of registration.
the request can be reinforced using strong authentication e. g.