Authentication protocol

Results: 881



#Item
161Information / Computer network security / Protected Extensible Authentication Protocol / Windows Server / Extensible Authentication Protocol / IEEE 802.1X / Windows / Authentication protocol / Transport Layer Security / Computing / Wireless networking / Data

Cisco − Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication Table of Contents Cisco Secure ACS for Windows v3.2 With PEAP−MS−CHAPv2 Machine Authentication.......................1 Docum

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:22:41
162Internet / Spamming / Electronic documents / File sharing networks / Bitcoin / Peer-to-peer computing / Public-key cryptography / Communications protocol / Peer-to-peer / Computing / Email / Computer-mediated communication

      Bitmessage: A Peer‐to‐Peer Message Authentication and Delivery System     

Add to Reading List

Source URL: www.bitmessage.org

Language: English - Date: 2013-07-30 20:37:14
163Cryptographic protocols / Internet / Data / Secure communication / Transport Layer Security / Cipher suite / Lightweight Directory Access Protocol / FTPS / Extensible Authentication Protocol / Computing / Internet standards / Internet protocols

Advanced Client/Server Authentication in TLS Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith Computer Science Department Brigham Young University Provo, Utah, USA 84602

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2002-02-26 10:17:06
164Ubiquitous computing / Wireless / Authentication protocol / Technology / Computing / Information / Automatic identification and data capture / Privacy / Radio-frequency identification

On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol Masoumeh Safkhani1 , Nasour Bagheri1 , Mehdi Hosseinzadeh2 , Mojtaba Eslamnezhad Namin2 , Samad Rostampour2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 04:32:06
165Internet standards / Access token / Computer security / OAuth / JavaScript / OpenID / Hypertext Transfer Protocol / Security token / RADIUS / Computing / Cloud standards / Internet protocols

Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose, USA {jtrammel,

Add to Reading List

Source URL: www.umityalcinalp.com

Language: English - Date: 2013-01-24 18:05:14
166Cryptographic protocols / Authentication protocol / PERMIS / Authentication / Communications protocol / Data / Information / Security

Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge by Hongbin Zhou, B.E., M.E.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-10 06:07:06
167Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-27 18:53:42
168Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2009-01-08 08:47:19
169Information Card / Authentication / Service-oriented architecture / Password authentication protocol / Security / Federated identity / Computer security

PDF Document

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2013-10-11 09:51:10
170Protected Extensible Authentication Protocol / Computing / Wi-Fi / Technology / Wireless security / Telecommunications engineering / Features new to Windows XP / Computer network security / Password / Wireless networking

Microsoft Word - Windows 7 Staff Wireless Setup Guide Non-Validatedocx

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:20
UPDATE