Authentication protocol

Results: 881



#Item
261Digital signature / Key management / RSA / Communications protocol / Blind signature / Group signature / Cryptography / Public-key cryptography / Cryptographic protocols

Universally Composable Signature, Certification, and Authentication∗ Ran Canetti† August 15, 2004 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-15 10:02:29
262Data / Cryptographic protocols / Internet protocols / Digest access authentication / Request for Comments / Internet standards / Basic access authentication / Authentication / Hypertext Transfer Protocol / Computing / HTTP / Internet

Internet Engineering Task Force (IETF) Request for Comments: 7235 Obsoletes: 2616 Updates: 2617 Category: Standards Track ISSN:

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-06-06 21:15:27
263Technology / Extensible Authentication Protocol / IEEE 802.1X / Cisco Systems / Authentication protocol / Electronics / Computing / Computer network security / Wireless networking

SISAS - Implementing Cisco Secure Access Solutions Days: 5 Course Objectives: Upon completing this course, you will be able to meet these objectives: -

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2014-01-27 15:41:41
264Ubiquitous computing / Wireless / Physical Unclonable Function / Technology / Authentication protocol / Telecommunications engineering / Computing / Automatic identification and data capture / Privacy / Radio-frequency identification

Security Analysis of a PUF based RFID Authentication Protocol Masoumeh Safkhani1 , Nasour Bagheri2 and Majid Naderi1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-09 03:59:55
265Computer network security / Windows / Computer architecture / Computing / Eduroam / Protected Extensible Authentication Protocol

Microsoft Word - eduroam Windows 7 Wireless Setup Guide Staff and Student Non-validatedocx

Add to Reading List

Source URL: cits.curtin.edu.au

Language: English - Date: 2015-05-14 21:39:19
266OAuth / Security / Computer security / Cross-platform software / Web 2.0 / Gmail / Identity management / Authentication / Twitter / Computing / Cloud standards / Internet protocols

www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2012-03-08 10:27:55
267Cyberwarfare / Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Authentication protocol / Key distribution center / Apple Open Directory / Computer network security / Computer security / Key management

Taming the Beast Assess Kerberos-Protected Networks Emmanuel Bouillon                           

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
268Computing / Spamming / Anti-spam techniques / Sender Policy Framework / Email spam / Simple Mail Transfer Protocol / Sender ID / Email authentication / Bayesian spam filtering / Spam filtering / Email / Computer-mediated communication

SMTP Path Analysis Barry Leiba IBM Research Hawthorne, NY Joel Ossher

Add to Reading List

Source URL: internetmessagingtechnology.org

Language: English - Date: 2011-04-20 17:23:24
269Computing / Spam filtering / Simple Mail Transfer Protocol / SMTP Authentication / Email spam / IP address / Anti-spam techniques / Email authentication / Email / Spamming / Computer-mediated communication

Outbound Port 25 blocking for dynamic IP Addresses IETF 92 Dallas, Texas, USA Takehito Akagiri, Rakuten, Inc. Kaoru Maeda, Lepidum Co. Ltd.

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-03-22 21:41:31
270Information / Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / Burrows–Abadi–Needham logic / Communications protocol / Public-key cryptography / Transmission Control Protocol / Otway–Rees protocol / Cryptographic protocols / Data / Cryptography

A General Approach to the Verification of Cryptographic Protocols using Answer Set Programming James P. Delgrande, Torsten Grote, and Aaron Hunter School of Computing Science, Simon Fraser University,

Add to Reading List

Source URL: www.cs.sfu.ca

Language: English - Date: 2010-05-31 18:50:51
UPDATE