Amsterdam, The Netherlands, October 8, 2009 - Gemalto, the world leader in digital security, today announced the launch of Protiva Smart Guardian, a smart card enabled personal security USB device ...
Aladdin Knowledge Systems plans to release a smart-card token at the RSA Conference later this month that combines a one-time password generator, a system that aims to improve desktop security.
A new smart ring has been created called Token which is capable of storing your credit card details enabling you to make payments wirelessly using Token. As well as keep all your everyday passwords ...
A new research paper from WEDI, the Workgroup for Electronic Data Interchange formed by HHS in 1991 that serves as an advisor to the agency, examines the feasibility and usability of “secure identity ...
Look out, Frodo — we might have a new "One Ring to rule them all." Token, a new smart ring, promises to give its wearers a chance to make mobile payments, unlock doors, and ditch their passwords — all ...
The use of RFID and contactless smart card technology is exploding and devices (e.g. tags, tokens, cards) all require embedded memory arrays that suit the needs of the application. All of these ...
ActivCard enterprise-class authentication and digital signature solutions safeguard access to desktops, laptops, and servers with multi-application smart card technology that identifies users for ...
Click to share on Facebook (Opens in new window) Facebook Click to share on X (Opens in new window) X As SEPTA was preparing to phase out the sale of tokens to most customers, commuters pondered the ...
Did you know that 76 percent of colleges still use a magnetic stripe card, even though students are the leading first adapters for new technologies? Only 31 percent of these campuses are using ...
TokenCard, the first debit card powered by Ethereum smart contracts, has announced it will launch its crowdsale May 2. The parent company Monolith Ventures, which seeks to “bring the VISA payments ...
A team of cryptographic researchers claim to have developed an attack method that can be used to recover secret keys in an acceptable time frame from cryptographic devices like smart cards, hardware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results