Authentication protocol

Results: 881



#Item
271Cross-site scripting / HTTP cookie / Application security / JavaScript / Hypertext Transfer Protocol / Session / Application server / Transport Layer Security / Digest access authentication / Computing / HTTP / Computer security

Developing Secure Web Applications White Paper Izhar Bar-Gad Amit Klein

Add to Reading List

Source URL: www.cgisecurity.com

Language: English - Date: 2008-11-02 16:08:47
272Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
273Computing / Computer network security / Data / IEEE 802.11 / Secure communication / IEEE 802.11i-2004 / IEEE 802.1X / Wireless security / Extensible Authentication Protocol / Cryptography / Cryptographic protocols / Wireless networking

Microsoft Word - NDSS05.doc

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-06-17 01:35:04
274Cigna / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

Talking Points for Management Referrals to the Employee Assistance Program (EAP) A manager’s communication with an employee about the reason for the EAP referral and expectations for behavior is equally as important as

Add to Reading List

Source URL: apps.cignabehavioral.com

Language: English - Date: 2011-09-14 13:27:34
275Technology / IEEE 802.1X / Computer security / IEEE 802.11 / Wireless LAN / Wireless access point / Password authentication protocol / Service set / Cracking of wireless networks / Computer network security / Wireless networking / Computing

802.11: Use, Misuse and the Need for a Robust Security Toolkit David Pollino Mike Schiffman

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:34:14
276Mobile technology / Electronic engineering / System Architecture Evolution / LTE Advanced / Diameter / 3GPP Long Term Evolution / Mobile virtual network operator / 3GPP / User equipment / Universal Mobile Telecommunications System / Technology / Internet Protocol

MARBEN DIAMX GATEWAY THE RELIABLE GATEWAY SYSTEM FOR DIAMETER INTERCONNECTIVITY CARRIER GRADE DIAMETER MEDIATION GATEWAY FOR RAPIDLY INTERCONNECTING MOBILE NETWORK OPERATORS SYSTEMS - BILLING, CHARGING, AUTHENTICATION- T

Add to Reading List

Source URL: www.marben-products.com

Language: English - Date: 2014-04-22 10:11:10
277Electronic commerce / Financial cryptography / Digital credential / Credential / Electronic authentication / Digital signature / Blind signature / Cryptographic protocol / Authentication / Cryptography / Identity management / Public-key cryptography

A Technical Overview of Digital Credentials Dr. Stefan Brands Credentica February 20, 2002 Abstract

Add to Reading List

Source URL: cypherspace.org

Language: English - Date: 2007-02-16 10:07:45
278Internet protocols / Network protocols / Tunneling protocols / Computer network security / Point-to-Point Tunneling Protocol / Internet standards / LM hash / Microsoft Point-to-Point Encryption / Password authentication protocol / Computing / Data / Network architecture

Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
279Data / IEEE 802.1X / Information / Internet protocols / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-08-18 19:01:31
280Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE