Authentication protocol

Results: 881



#Item
191Communications protocol / ANT / Key distribution / Man-in-the-middle attack / Cryptography / Public-key cryptography / Message authentication code

Practical Broadcast Authentication in Sensor Networks ∗ Donggang Liu Peng Ning Cyber Defense Laboratory Department of Computer Science North Carolina State University {dliu,pning}@ncsu.edu

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
192Security / Secure communication / Data / HTTP Secure / Hypertext Transfer Protocol / Session / World Wide Web / Two-factor authentication / Cross-site request forgery / Computing / HTTP / Cryptographic protocols

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:12
193Central processing unit / Coprocessor / Two-factor authentication / Authentication / Communications protocol / Cryptography / Security / Public-key cryptography

Int J Inf Secur: 28–41 / Digital Object Identifier (DOIs10207Outbound authentication for programmable secure coprocessors Sean W. Smith Department of Computer Science, Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:39:47
194OSI protocols / Hypertext Transfer Protocol / HTTP cookie / Basic access authentication / MIME / Communications protocol / HTTP / Computing / Data

HttpClient Tutorial Oleg Kalnichevski Jonathan Moore Jilles van Gurp

Add to Reading List

Source URL: hc.apache.org

Language: English - Date: 2015-03-30 11:32:44
195IEEE 802.1X / Eduroam / Protected Extensible Authentication Protocol / Features new to Windows XP / Computing / Computer network security / Windows XP

Microsoft Word - Windows XP eduroam Wireless Setup Guidedocx

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:13
196Internet protocols / Internet standards / Videotelephony / Digest access authentication / Session Initiation Protocol / Computing / Brekeke SIP Server / JavaScript

Brekeke PBX - Version 2.1 User Guide

Add to Reading List

Source URL: www.brekeke.com

Language: English - Date: 2013-03-29 15:51:49
197Computing / Computer network security / Cryptographic protocols / Internet protocols / Authenticator / HTTP cookie / Digest access authentication / Password authentication protocol / Kerberos / HTTP / Computer security / Security

Dos and Don’ts of Client Authentication on the Web Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster fubob, sit, kendras, feamster @mit.edu  MIT Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:14
198Technology / Wireless / Computer network security / IEEE 802.11 / Wi-Fi / Wireless security / Extensible Authentication Protocol / IEEE 802.11i-2004 / Wi-Fi Protected Access / Wireless networking / Cryptographic protocols / Cryptography

Cisco − Wi−Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi−Fi Protected Access 2 (WPA 2) Configuration Example..........................................................................1 Do

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:05
199Technology / Wireless / Cryptographic protocols / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / Wpa supplicant / Wireless networking / Computer network security / Computing

Cisco − WPA Configuration Overview Table of Contents WPA Configuration Overview...........................................................................................................................1 To get Cisco

Add to Reading List

Source URL: www.awesometechhome.com

Language: English - Date: 2012-11-19 22:29:06
200Wireless networking / IEEE 802.1X / Protected Extensible Authentication Protocol / Password / Microsoft Windows / Features new to Windows XP / Wireless security / Computer network security / Windows XP / Computing

PDF Document

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:17
UPDATE