Authentication protocol

Results: 881



#Item
141Lightweight Directory Access Protocol / Computer architecture / Active Directory / Daemon / Identity management / Directory services / Computing / System software

Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Mark Robinson

Add to Reading List

Source URL: www.susecon.com

Language: English - Date: 2014-12-12 11:35:44
142Simple Mail Transfer Protocol / Post Office Protocol / Message transfer agent / Mail / Anti-spam techniques / Gmail interface / Email / Computer-mediated communication / Computing

Microsoft Word - Configure Outlook email to use port 587 with authentication.docx

Add to Reading List

Source URL: www.ddswebdesign.com

Language: English - Date: 2013-04-02 14:23:17
143

RFC 3748 : Extensible Authentication Protocol (EAP) St´ephane Bortzmeyer <> Premi`ere r´edaction de cet article le 11 mai 2006

Add to Reading List

Source URL: www.bortzmeyer.org

Language: French - Date: 2014-12-02 04:01:44
    144Mail submission agent / Message transfer agent / Simple Mail Transfer Protocol / Email client / SMTP Authentication / Anti-spam techniques / Mail delivery agent / Open mail relay / Bounce address / Email / Computer-mediated communication / Computing

    Network Working Group Request for Comments: 5068 BCP: 134 Category: Best Current Practice C. Hutzler

    Add to Reading List

    Source URL: bbiw.net

    Language: English - Date: 2008-04-03 18:29:20
    145Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

    Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols

    Add to Reading List

    Source URL: www.eecis.udel.edu

    Language: English - Date: 2003-01-09 19:58:21
    146Notary / Internet protocols / Access control / Authentication / Public key certificate / Password authentication protocol / Cryptography / Key management / Public-key cryptography

    Online Certification/Authentication of Documents re: Business Entities – 201–April–05 Topic: Online Certification/Authentication of Documents re: Business Entities

    Add to Reading List

    Source URL: www.iaca.org

    Language: English - Date: 2013-02-07 21:37:40
    147Technology / IEEE 802.1X / SCADA / Smart grid / Virtual private network / Internet security / MPLS VPN / Extensible Authentication Protocol / Virtual LAN / Computing / Computer network security / Network architecture

    Interoperability and Security for Converged Smart Grid Networks Andrew K. Wright Paul Kalv Rodrick Sibery

    Add to Reading List

    Source URL: www.gridwiseac.org

    Language: English - Date: 2010-12-09 13:54:15
    148Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

    Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2012-01-13 10:28:23
    149Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

    Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2012-01-15 19:52:05
    150Key management / Electronic commerce / Verifiable secret sharing / Key distribution / Interactive proof system / Diffie–Hellman key exchange / Authentication / Secret sharing / Computer network / Cryptography / Cryptographic protocols / Public-key cryptography

    Implementation of Group Member Authentication Protocol in Mobile Ad-hoc Networks Hitoshi Asaeda∗ , Musfiq Rahman† , Mohammad Hossein Manshaei‡ , Yasuko Fukuzawa§ University, Graduate School of Media and Governance

    Add to Reading List

    Source URL: web.sfc.wide.ad.jp

    Language: English - Date: 2006-01-24 03:14:56
    UPDATE