Authentication protocol

Results: 881



#Item
171Wireless networking / IEEE 802.1X / Protected Extensible Authentication Protocol / Features new to Windows XP / Wireless security / Computer network security / Windows XP / Computing

Microsoft Word - Windows XP Student Wireless Setup Guide Non-Validatedocx

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:15
172Wireless networking / Computing / Windows Vista / Wireless security / Features new to Windows XP / Password / Protected Extensible Authentication Protocol / Computer network security

Microsoft Word - Windows 7 Student Wireless Setup Guide Non-Validatedocx

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:20
173Computing / Cyberwarfare / Cryptographic protocols / IEEE 802.11 / Wired Equivalent Privacy / Wireless security / Lightweight Extensible Authentication Protocol / Wi-Fi Protected Access / RC4 / Cryptography / Computer network security / Wireless networking

Identifying and Responding to Wireless Attacks Chris Hurley (roamer) Contents

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:35
174IEEE 802 / Wireless sensor network / Synchronization / Clocks / Clock synchronization / Sensor node / IEEE 802.15.4 / Communications protocol / Message authentication code / Technology / Computing / Telecommunications engineering

TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks ∗ Kun Sun, Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
175Secure Shell / Daemon / Password / File Transfer Protocol / Authentication / Internet / Computing / Network architecture

Lecture 24: The Dictionary Attack and the Rainbow-Table Attack on Password Protected Systems Lecture Notes on “Computer and Network Security” by Avi Kak () April 27, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-27 11:09:36
176Information / Cryptographic protocols / Free software / ProVerif / Ciphertext indistinguishability / Communications protocol / Cryptographic primitive / Authentication / Tor / Cryptography / Cryptographic software / Data

Verification of security protocols — reducing the number of agents — Laboratory, institution and university LSV, ENS Cachan and LORIA, Nancy universités The internship will be located at Nancy and/or at ENS Cachan d

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2014-10-21 15:33:34
177Technology / Ubiquitous computing / Wireless / Surveillance / Authentication protocol / Cryptographic nonce / Automatic identification and data capture / Radio-frequency identification / Human–computer interaction

1 Securing Low-cost RFID Systems: an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran a a

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2011-04-26 12:59:27
178Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:43:38
179Spam filtering / Computer-mediated communication / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / SMTP Authentication / Simple Mail Transfer Protocol / Sender Policy Framework / Vouch by Reference / Email authentication / Email / Computing

draft-ietf-appsawg-rfc7001bis-07 - Message Header Field for Indicating Message Authentication Status

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-22 05:04:16
180IP address / Transmission Control Protocol / Port / Computer network security / Dynamic Host Configuration Protocol / Email authentication / Computing / Network architecture / Internet

PDF Document

Add to Reading List

Source URL: dwn.tensionsoftware.com

Language: English - Date: 2014-04-24 10:24:21
UPDATE