Access Authentication

Results: 2034



#Item
671Email authentication / Spam filtering / Internet standards / Cross-platform software / Exim / Extended SMTP / DomainKeys Identified Mail / Access control list / SMTP Authentication / Email / Computer-mediated communication / Computing

Specification of the Exim Mail Transfer Agent Exim Maintainers Specification of the Exim Mail Transfer Agent Author: Exim Maintainers

Add to Reading List

Source URL: www.no.exim.org

Language: English - Date: 2015-01-12 10:13:04
672Cryptographic protocols / Technology / Cryptography / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless networking / Computing / Computer network security

Microsoft Word - ORiNOCO security paper v2.2.doc

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
673Password / HMAC / Keychain / Cryptographic software / Digest access authentication / Password strength / Cryptography / Computer security / Security

CS255: Cryptography and Computer Security Winter 2008 Programming Project #1 Due: Friday, February 8th, 2008.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-01 18:07:18
674Access control / Computer network security / Authentication / Notary / Packaging / Security token / Multi-factor authentication / Password / Risk-based authentication / Security / Cryptography / Computer security

Effective and Painless Mult-Factor Authentication

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
675Grammar / Authentication / Access token / Question / Government / Government of India / Unique Identification Authority of India / Security

Standardization Case Study

Add to Reading List

Source URL: standardslearn.org

Language: English - Date: 2014-03-31 09:36:33
676Pluggable authentication module / HTTP / Linux PAM / Kerberos / Password / Authentication / Basic access authentication / Solaris / Software / Computing / System software

Stanford University July 26, 2014 Kerberos and PAM

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
677Internet / Data / Internet standards / Password / Transport Layer Security / Digest access authentication / Secure Shell / Computing / Cryptographic protocols / Computer network security

CS255: Introduction to Cryptography Winter 2009 Programming Project #1 Milestone #1 Due Date: Friday, January 21st, 2009.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-01-14 17:24:56
678Computer security / Internet / Cryptographic protocols / Computer network security / CoSign single sign on / SPNEGO / Kerberos / Shibboleth / Lightweight Directory Access Protocol / Internet standards / Federated identity / Computing

Stanford University July 26, 2014 Stanford Web Authentication Overview

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
679Cryptography / Computer network security / Technology / IEEE 802.11 / Wi-Fi / Wpa supplicant / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Wireless networking / Cryptographic protocols / Computing

PROXIM AND WI-FI PROTECTED ACCESS (WPA) What is WPA? As an intermediate WLAN security solution that can be applied to existing WLAN client hardware, the Wi-Fi Alliance has adopted Wi-Fi Protected Access (WPA). Proxim wil

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
680Directory services / Password / Lightweight Directory Access Protocol / Authentication / Computing / Internet / Security / Internet protocols / Internet standards

Stanford University July 26, 2014 Wallet Secure Data Distribution and Management

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
UPDATE