Authentication protocol

Results: 881



#Item
281IEEE 802.1X / VMware View / Citrix XenApp / Dell / Thin client / Desktop virtualization / Protected Extensible Authentication Protocol / Pano Logic / Computing / Remote desktop / Citrix Systems

Businessman Using U2913WM Monitor at His Desk

Add to Reading List

Source URL: site.arcy.com

Language: English - Date: 2014-01-03 19:57:53
282Internet / Data / RADIUS / Computer network security / Transmission Control Protocol / Extensible Authentication Protocol / Security Assertion Markup Language / Firewall / Diameter / Computing / Internet protocols / Internet standards

Internet Engineering Task Force (IETF) Request for Comments: 7499 Category: Experimental ISSN: A. Perez-Mendez, Ed.

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2015-04-06 16:44:02
283Data / IEEE 802.1X / Internet protocols / Information / Internet standards / Extensible Authentication Protocol / RADIUS / Authenticator / Computing / Computer network security / Wireless networking

Network Working Group Request for Comments: 4137 Category: Informational J. Vollbrecht Meetinghouse Data Communications

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2005-09-07 12:32:45
284Cryptographic protocols / Technology / Cryptography / IEEE 802.11 / Wi-Fi / Extensible Authentication Protocol / IEEE 802.1X / Wireless security / Wi-Fi Protected Access / Wireless networking / Computing / Computer network security

Microsoft Word - ORiNOCO security paper v2.2.doc

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
285Computer security / Computer network security / Security service / Non-repudiation / Public key infrastructure / Deniable authentication / Plausible deniability / Key-agreement protocol / Information security / Cryptography / Public-key cryptography / Cryptographic protocols

Cryptography and Evidence Michael Roe Clare College A dissertation submitted for the degree of Doctor of Philosophy in the University of Cambridge

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 1999-08-17 09:51:55
286Information / Internet standards / Data transmission / Petroleum production / Separator / Communications protocol / Transmission Control Protocol / Password authentication protocol / Pointer / Computing / Data / Internet protocols

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis ∗ Juan Caballero∗ , Heng Yin†∗ , Zhenkai Liang∗ , Dawn Song‡∗ Carnegie Mellon University † College of William and Ma

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
287Computer security / Internet / Cryptographic protocols / Computer network security / CoSign single sign on / SPNEGO / Kerberos / Shibboleth / Lightweight Directory Access Protocol / Internet standards / Federated identity / Computing

Stanford University July 26, 2014 Stanford Web Authentication Overview

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
288Computing / Telecommunications engineering / IEEE 802.1X / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wi-Fi / ARINC / IEEE 802 / Wireless networking / Computer network security / Technology

KEY BENEFITS: Global regulatory approvals (radio certification) obtained for legal operation of TWLU on aircraft End to end network security with latest 802.1x authentication, WPA2, WPA, & WEP Associates with any IEEE

Add to Reading List

Source URL: mymiltope.com

Language: English - Date: 2014-10-24 11:45:10
289Cryptography / Computer network security / Technology / IEEE 802.11 / Wi-Fi / Wpa supplicant / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Wireless networking / Cryptographic protocols / Computing

PROXIM AND WI-FI PROTECTED ACCESS (WPA) What is WPA? As an intermediate WLAN security solution that can be applied to existing WLAN client hardware, the Wi-Fi Alliance has adopted Wi-Fi Protected Access (WPA). Proxim wil

Add to Reading List

Source URL: www.nowire.se

Language: English - Date: 2014-11-12 08:22:48
290Directory services / Password / Lightweight Directory Access Protocol / Authentication / Computing / Internet / Security / Internet protocols / Internet standards

Stanford University July 26, 2014 Wallet Secure Data Distribution and Management

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
UPDATE