June 2006
Bank Technology News;Jun2006, Vol. 19 Issue 6, p10
Trade Publication
The article reports on the Vasco's Digipass two-factor authentication technology, a newly implemented security system by Citibank in the U.S.


Related Articles

  • A Fast and Accurate Face Authentication Method Using Hamming-Trace Transform Combination. Fooprateepsiri, Rerkchai; Kurutach, Werasak // IETE Technical Review;Sep/Oct2010, Vol. 27 Issue 5, p365 

    Face authentication, also called face verification, is used to confirm the identity of a person by classifying the person as either the person he or she claims to be or not. For face authentication, the user generally provides a user name (and in some cases a password as well) to an...

  • Security Management of Spyware via the Authentication of Web Communication. Clutterbuck, Peter // Proceedings of the European Conference on Information Management;2010, p34 

    A continuing Internet information management challenge is the significant prevalence of software that aids in collecting and transmitting information about a person or organization without the information-owner's consent. This software is popularly known as spyware. The Internet users'...

  • Security Schemes for a Mobile Agent Based Network and System Management Framework. Ching-hang Fong; Parr, Gerard; Morrow, Philip // Journal of Network & Systems Management;Jun2011, Vol. 19 Issue 2, p230 

    In previous research work, we proposed an integrated framework to guide the design of a Mobile Agent based Network Management (MANM) system, namely the Mobile Agent based framework for Security enhanced Autonomous network and system Management (MASAM). This framework offered two distinct...

  • FENDING OFF FRAUD. SILVA, JERRY // Information Security;Apr2010, Vol. 12 Issue 3, p28 

    The article offers information on anti-fraud technology for online banking security. It discusses several security systems with a watch capability which include the eFraudNetwork from RSA security division of EMC and FraudNet from Fiserv. It explains the authentication system process and...

  • Single Sign-on Does Double Duty. Zalud, Bill; Thomas, Beth; Bunner, Darryl; Leader, Eric; Wasylyna, Donald // Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p12 

    The article focuses on single sign-on, a single method of access control used to attest the genuineness once and enter to the resources of multiple software systems. According to the authors, single sign-on is an easily available benefit in a homogeneous IT infrastructure or in an existing...

  • Not Just Token Praise.  // Information Security;Feb2006, Vol. 9 Issue 2, p29 

    Highlights the authentication security system RSA SecurID from RSA Security. Features of the two-factor authentication product; Application of the system in enterprise management; Performance capabilities of the product.

  • An Automation ANSWER. Ghai, Vik // Government Security;May/Jun2008, Vol. 7 Issue 3, p24 

    This article reports that smart cards, cards utilized to gain physical security access to secure or sensitive areas, are prone to hacking, and companies need to institute additional security measures. The article suggests that automated security systems that check multiple factors for...

  • Optical variable technology.  // Packaging Digest;Dec2005, Vol. 42 Issue 12, p19 

    The article presents information on the optical variable technology (OVT) based AuthentiGuard Phantom developed by Document Security Systems Inc. Phantom can be used alone or in combination with other OVT processes such as holograms or special inks. It does not require special viewing devices or...

  • A user authentication system using back-propagation network. Iuon-Chang Lin; Hsia-Hung Ou; Min-Shiang Hwang // Neural Computing & Applications;2005, Vol. 14 Issue 3, p243 

    Information security has been a critical issue in the field of information systems. One of the key factors in the security of a computer system is how to identify the authorization of users. Password-based user authentication is widely used to authenticate a legitimate user in the current...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics