Authentication protocol

Results: 881



#Item
121

暗号プロトコル評価対象の概要 独立行政法人 情報通信研究機構 1.プロトコル名:Extensible Authentication Protocol Method for Global System for Mobile Communications

Add to Reading List

Source URL: crypto-protocol.nict.go.jp

Language: Japanese - Date: 2015-10-20 00:24:04
    122Authentication protocols / Symmetric-key cryptography / NeedhamSchroeder protocol / Cryptographic protocol

    PDF Document

    Add to Reading List

    Source URL: ect.bell-labs.com

    Language: English - Date: 2010-12-15 21:38:38
    123Cryptographic protocols / Internet Standards / Internet protocols / Cryptographic software / Secure communication / Transport Layer Security / GnuTLS / OpenSSL / Cipher suite / Electronic authentication / Online Certificate Status Protocol / X.509

    PDF Document

    Add to Reading List

    Source URL: gnutls.org

    Language: English - Date: 2016-02-03 03:28:21
    124Computer network security / Wireless networking / Computing / IEEE 802.11 / IEEE 802.1X / Technology / Wireless security / Wi-Fi / Wireless network / Extensible Authentication Protocol

    PDF Document

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2015-06-21 14:34:41
    125

    暗号プロトコル評価結果 独立行政法人 情報通信研究機構 1.プロトコル名:Protocol for Carrying Authentication for Network Access(PANA)

    Add to Reading List

    Source URL: crypto-protocol.nict.go.jp

    Language: English - Date: 2015-10-20 00:24:04
      126Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols

      Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

      Add to Reading List

      Source URL: www.cs.bu.edu

      Language: English - Date: 2009-01-20 23:46:12
      127Payment systems / Digital technology / Electronic money / Financial cryptography / Hypertext Transfer Protocol / Error message / Web standards / Technology / Computing / Cryptographic protocols / Electronic commerce

      CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

      Add to Reading List

      Source URL: www.cavirtex.com

      Language: English - Date: 2014-10-02 19:03:57
      128Computing / Wi-Fi / Electronic engineering / Wireless access points / IEEE 802.1X / Hotspot / Wireless LAN / Protected Extensible Authentication Protocol / IEEE 802.11 / Wireless networking / Computer network security / Technology

      Anyfi Networks Carrier Wi-Fi System BASIC SDWN CORE

      Add to Reading List

      Source URL: www.anyfinetworks.com

      Language: English - Date: 2015-06-22 11:17:44
      129Software / Computer network security / Provisioning / Password / Tru / Authentication / Generic Access Network / Extensible Authentication Protocol / Devicescape Software / Wi-Fi / Computing / Technology

      BIRDSTEP’S SMARTPROVISION SOLUTION – TRUE “ZERO CLICK” CONNECTIVITY TO KEEP YOUR SUBSCRIBERS CONNECTED ACROSS YOUR HETNET AND GIVE THEM THE BEST USER EXPERIENCE THERE ARE THOUSANDS OF WI-FI NETWORKS, LARGE AND SM

      Add to Reading List

      Source URL: birdstep.com

      Language: English - Date: 2015-03-30 06:29:07
      130Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

      Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

      Add to Reading List

      Source URL: naveen.ksastry.com

      Language: English - Date: 2013-06-08 15:25:49
      UPDATE