Authentication protocol

Results: 881



#Item
151Computer network security / Internet protocols / Internet standards / Directory services / Multi-factor authentication / Authentication / Lightweight Directory Access Protocol / Kerberos / Password / Security / Computer security / Computing

State of New Mexico Statewide Architectural Configuration Requirement Title: Authentication and Directory Services Standard S-STD001.002 Effective Date: October 18, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:21
152Extensible Authentication Protocol / Wireless networking

November 2013 Newsletter Five Things You Should Never Say at Work! There are certain statements that are considered toxic in the workplace, according to Barbara

Add to Reading List

Source URL: 15u3y62k4f331ho505myktxx.wpengine.netdna-cdn.com

Language: English - Date: 2015-04-20 22:13:08
153Network architecture / Real Estate Transaction Standard / HTTP / Cryptographic protocols / World Wide Web / Hypertext Transfer Protocol / Digest access authentication / Representational state transfer / Session / Computing / Network protocols / Real estate

RETS Certification System RETSand 1.8 Testing Rules Version: 02 June 2014 RETS Compliance & Certification

Add to Reading List

Source URL: www.reso.org

Language: English - Date: 2014-06-19 14:06:06
154Leap / Lightweight Extensible Authentication Protocol

LEAP first year learning community_Logo

Add to Reading List

Source URL: leap.utah.edu

Language: English - Date: 2015-05-04 12:23:26
155Wi-Fi Protected Setup / Wireless networking / Technology / Telecommunications engineering / Extensible Authentication Protocol / IEEE 802.11 / Authenticator / HostAP / Supplicant / Wi-Fi / Cryptographic protocols / Computing

Brute forcing Wi-Fi Protected Setup When poor design meets poor implementationVersion 3

Add to Reading List

Source URL: sviehb.files.wordpress.com

Language: English - Date: 2011-12-27 05:58:32
156Security token / Keychain / Authentication protocol / Applied Cryptography and Network Security / AKA / Cryptography / Cryptographic protocols / MIFARE

PDF Document

Add to Reading List

Source URL: icsd.i2r.a-star.edu.sg

Language: English - Date: 2012-06-13 22:48:00
157Information technology management / Open Financial Exchange / Data aggregator / Account aggregation / Transaction authentication number / Authentication / Password / Security Assertion Markup Language / Hypertext Transfer Protocol / Computing / Security / Computer file formats

DOC Document

Add to Reading List

Source URL: www.ofx.net

Language: English - Date: 2007-10-17 21:09:52
158Employment compensation / Psychotherapy / Mental health / Wireless networking / British Association for Counselling and Psychotherapy / Medicine / Computer network security / Extensible Authentication Protocol / Occupational safety and health / Health / Employee assistance program

UK Employee Assistance Professionals Association Employee Assistance Programmes: a buyer’s guide

Add to Reading List

Source URL: www.eapa.org.uk

Language: English - Date: 2014-04-16 12:23:43
159Integrated Windows Authentication / Revocation list / Authentication / Digital signature / X.509 / Parity of a permutation / Cryptography / Public-key cryptography / Password authentication protocol

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-03-26 16:30:23
160Computer security / Computer network security / Authentication protocol / Authentication / Kerberos / Cryptography / Cryptographic protocols / Security

Demarcation of Security in Entity Authentication Protocols Naveed Ahmed & Christian D. Jensen DTU Informatics, Denmark July 6, 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:29:53
UPDATE