Authentication protocol

Results: 881



#Item
131Security / Dolev-Yao model / Authentication protocol / Cryptography / Cryptographic nonce / Communications protocol / Authentication / Π-calculus / Cryptographic protocols / Data / Information

ACI ROSSIGNOL Denis LUGIEZ www.cmi.univ-mrs.fr/ lugiez/aci-rossignol.html 

Add to Reading List

Source URL: www.irisa.fr

Language: English - Date: 2003-12-17 02:53:50
132Internet protocols / Two-factor authentication / Single sign-on / RADIUS / Authentication / Password / Multi-factor authentication / Extensible Authentication Protocol / Identity management / Security / Computer security / Access control

C OD E42 T E C HN O LO GY N OT E Two-factor Authentication Increases security, decreases risk

Add to Reading List

Source URL: essentials.code42.com

Language: English
133

Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:18:28
    134

    draft-ietf-httpbis-auth-info-05 - The Hypertext Transfer Protocol …HTTP— Authentication-Info and Proxy- Authentication-Info Response Header Fields

    Add to Reading List

    Source URL: tools.ietf.org

    Language: English - Date: 2015-04-08 05:03:34
      135

      Hotspot ECN ITCH Protocol v1Itch Session Management Protocol The Session Management Protocol provides login / logout and authentication facilities, as well as sequenced packet functionality which provides order in

      Add to Reading List

      Source URL: www.hotspotfx.com

      Language: English - Date: 2015-03-26 09:12:30
        136

        Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2012-06-05 18:18:28
          137Data / Information / Communications protocol / Challenge-response authentication / Cryptography / Physical Unclonable Function / Randomness

          2013 IEEE Symposium on Security and Privacy PUFs in Security Protocols: Attack Models and Security Evaluations Ulrich R¨uhrmair Computer Science Department Technische Universit¨at M¨unchen

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2013-04-05 19:56:34
          138Digital signature / Public key certificate / Public key infrastructure / Authentication / Records management / Certificate authority / Cryptographic protocol / Digital Postmarks / Trusted timestamping / Cryptography / Public-key cryptography / Key management

          時刻認証基盤ガイドライン

          Add to Reading List

          Source URL: www.dekyo.or.jp

          Language: English - Date: 2015-06-17 21:01:44
          139

          2010 Paper 7 Question 13 Security Woo & Lam proposed a protocol that would enable a client A to log on to a server B using an authentication service S. A→

          Add to Reading List

          Source URL: www.cl.cam.ac.uk

          - Date: 2014-06-09 10:18:35
            140Telecommunications engineering / IEEE 802.1X / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Wireless Zero Configuration / Wireless LAN / Xsupplicant / Authentication protocol / Internet Authentication Service / Wireless networking / Computing / Technology

            How to configure 802.1x PEAP authentication for Windows XP wired connections The described below is based on the Windows XP Professional edition Service Pack 3. PEAP (Protected Extensible Authentication Protocol) is a ve

            Add to Reading List

            Source URL: www.eur.nl

            Language: English - Date: 2009-12-22 08:24:48
            UPDATE