Authentication protocol

Results: 881



#Item
181Data / Wireless networking / IEEE 802.1X / Internet protocols / Extensible Authentication Protocol / Cryptographic protocols / RADIUS / Authenticator / Supplicant / Computing / Computer network security / Computer security

Chapter 2, Port-Based Authentication Concepts Author: Jim Geier Principal Consultant, Wireless-Nets, Ltd. Email: This chapter is a sample from the book

Add to Reading List

Source URL: www.wireless-nets.com

Language: English - Date: 2013-06-12 20:30:23
182Computer security / Password / SPEKE / Salt / Key-agreement protocol / Replay attack / Password-authenticated key agreement / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Security

Authentication and Key Agreement via Memorable Password Taekyoung Kwon Abstract them, the knowledge-based scheme is aimed for

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:20:35
183Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack

Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi

Add to Reading List

Source URL: www.dsi.unive.it

Language: English - Date: 2005-06-07 06:44:01
184Network protocols / Internet protocols / Secure multicast / Data transmission / IP multicast / Transmission Control Protocol / Public-key cryptography / Message authentication code / Communications protocol / Data / Information / Network architecture

Efficient and Secure Source Authentication for Multicast Adrian Perrig  Ran Canetti

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:22:53
185Cross-platform software / Extensible Messaging and Presence Protocol / Online chat / Technology / XMPP Standards Foundation / Presence information / URI scheme / Simple Authentication and Security Layer / Transport Layer Security / Computing / Computer-mediated communication / Instant messaging

XEP-0170: Recommended Order of Stream Feature Negotiation Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 13:12:24
186HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
187Computing / Wireless networking / Information theory / ANT / Sensor node / Public-key cryptography / Transmission Control Protocol / Channel / Communications protocol / Wireless sensor network / Telecommunications engineering / Technology

Containing Denial-of-Service Attacks in Broadcast Authentication in Sensor Networks Ronghua Wang, Wenliang Du ∗ Department of EECS Syracuse University {rwang01, wedu}@ecs.syr.edu

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2007-06-08 22:24:12
188Cryptography / Technology / Cryptographic protocols / IEEE 802.11 / Extensible Authentication Protocol / Wired Equivalent Privacy / Password authentication protocol / Wireless access point / Integrated Windows Authentication / Wireless networking / Computer network security / Computing

YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2001-08-11 18:26:34
189Wireless networking / IEEE 802.1X / Xsupplicant / Protected Extensible Authentication Protocol / FreeRADIUS / Supplicant / RADIUS / Filesystem Hierarchy Standard / Ifconfig / Computing / Computer network security / System software

How To Use 802.1x Security with AT-WA7400 APs, AT-8624PoE Switches, and Linux’s freeRADIUS and Xsupplicant

Add to Reading List

Source URL: alliedtelesis.ae

Language: English - Date: 2010-08-25 21:30:49
190Internet protocols / Data transmission / Communications protocol / Protocols / Transmission Control Protocol / IP multicast / Public-key cryptography / Message authentication code / Authentication / Cryptography / Data / Information

RSA Laboratories Volume 5, No. 2, Summer / Fall 2002 CONTENTS I.

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2013-08-15 00:54:53
UPDATE