Authentication protocol

Results: 881



#Item
231Network protocols / Cryptographic protocols / IPv6 / Internet Protocol / Tunneling protocols / Mobile IP / Proxy Mobile IPv6 / IPsec / Internet Key Exchange / Network architecture / Computing / Data

Child-proof Authentication for MIPv6 (CAM) Michael Roe Greg O’Shea Microsoft Research Ltd St George House, 1 Guildhall Street

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:35
232Cryptography / Challenge-response authentication / IP / Alice and Bob / Baseband / Modulation / Channel / Distance-bounding protocol / Cryptographic protocols / Information / Data

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System ˇ Aanjhan Ranganathan1 , Nils Ole Tippenhauer1 , Boris Skori´ c2 , Dave Singel´ee3 , 1

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2013-03-16 15:45:20
233Computing / Malware / Cryptographic nonce / Bluetooth / Computer network / Electronic engineering / Computer network security / Wireless security / Extensible Authentication Protocol / Technology / Mobile computers / Mobile device management

Enabling Users to Self-Manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks Zheng Dong School of Informatics and Computing, Indiana University, Bloomington, IN, USA Abstr

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-12 01:47:18
234Milter / Extended SMTP / Sendmail / Simple Mail Transfer Protocol / Non delivery report / Local Mail Transfer Protocol / SMTP Authentication / Lightweight Directory Access Protocol / STARTTLS / Email / Computer-mediated communication / Computing

SENDMAIL RELEASE NOTES $Id: RELEASE_NOTES,v31 16:04:13 ca Exp $ This listing shows the version of the sendmail binary, the version of the sendmail configuration files, the date of release, and a summary o

Add to Reading List

Source URL: sendmail.com

Language: English - Date: 2010-11-18 18:43:32
235Data / Internet standards / Extensible Messaging and Presence Protocol / Online chat / Digest access authentication / Simple Authentication and Security Layer / URI scheme / CRAM-MD5 / SMTP Authentication / Computing / Cryptographic protocols / Internet

XEP-0078: Non-SASL Authentication Peter Saint-Andre mailto: xmpp: https://stpeter.im

Add to Reading List

Source URL: xmpp.org

Language: English - Date: 2014-04-08 12:57:57
236Technology / Data / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Authenticator / Supplicant / Wired Equivalent Privacy / Wireless access point / Computer network security / Computing / Wireless networking

I N D U S T R Y T R E N D S Will IEEE 802.1X Finally Take Off in 2008? Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:45:56
237Internet protocols / Cloud standards / OAuth / Authentication / Authorization / Identity management / Access token / SAML 2.0 / Security Assertion Markup Language / Computer security / Computing / Security

TECH 3366 THE CROSS PLATFORM AUTHENTICATION PROTOCOL VERSION 1.0

Add to Reading List

Source URL: tech.ebu.ch

Language: English - Date: 2014-10-17 00:18:29
238Computing / Password authentication protocol / Transmission Control Protocol / Public-key cryptography / Authentication / Denial-of-service attack / Message authentication code / Wireless sensor network / Man-in-the-middle attack / Cryptography / Computer network security / Cyberwarfare

Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:13
239Cryptographic protocols / Internet protocols / Internet standards / Keystore / Public-key cryptography / Lightweight Directory Access Protocol / Authentication / Security token / Digest access authentication / Cryptography / Computing / Security

Oracle GlassFish Server Security Guide ReleaseE24940-01 February 2012

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-09 12:56:08
240IP / Complexity classes / Commitment scheme / Soundness / Challenge-response authentication / NP / Alice and Bob / Black box / Communications protocol / Cryptography / Cryptographic protocols / Zero-knowledge proof

Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy Vipul Goyal∗ UCLA and MSR India Email:

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-23 06:25:21
UPDATE