Authentication protocol

Results: 881



#Item
321Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2005-12-06 23:10:45
322Wireless networking / Computer network security / Extensible Authentication Protocol / Employee assistance program / Employment compensation / Occupational safety and health

Businessman putting together jigsaw puzzle

Add to Reading List

Source URL: www.clcnsw.org.au

Language: English - Date: 2014-04-09 19:21:28
323Data / Email / Anonymity / Public-key cryptography / Attribution / Communications protocol / Authentication / Internet privacy / Journalism sourcing / Computing / Social psychology / Information

Attribution Requirements for the Next Generation Internet Jeffrey Hunker Carrie Gates Matt Bishop

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2013-08-09 18:09:40
324Computing / Kerberos / Ticket Granting Ticket / Single sign-on / Key distribution center / Ticket / Authentication protocol / Passwd / Authentication / Computer network security / Cryptography / Computer security

Kerberos in an ISP environment UNIX/Win2K/Cisco > Nicolas FISCHBACH [removed] - http://www.securite.org/nico/ > Sébastien LACOSTE-SERIS

Add to Reading List

Source URL: www.securite.org

Language: English - Date: 2001-05-10 11:35:55
325Spamming / Computing / Computer-mediated communication / Cryptographic protocols / Sender Policy Framework / DomainKeys Identified Mail / Anti-spam techniques / Simple Mail Transfer Protocol / Greylisting / Spam filtering / Email authentication / Email

An overview of the Sender Policy Framework (SPF) as an antiphishing mechanism Stefan Görling Royal Institute of Technology, Stockholm, Sweden Autobiographical note Stefan Görling is a doctoral researcher at the departm

Add to Reading List

Source URL: www.gorling.se

Language: English - Date: 2007-04-16 04:46:17
326Information / Internet Key Exchange / IPsec / Internet Security Association and Key Management Protocol / Security association / Oakley protocol / Internet security / Extensible Authentication Protocol / NAT traversal / Cryptographic protocols / Cryptography / Data

Fusion Embedded™ IKE Fusion Internet Key Exchange is an Internet Protocol security (IPsec) standard protocol used to ensure security for VPN negotiation and remote host or network access. It provides an automatic means

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:49:14
327Internet / SMTP Authentication / MX record / Port / Simple Mail Transfer Protocol / Anti-spam techniques / Email / Computer-mediated communication / Computing

User Guide SMTP Trap Current Version: 1.04l smtptrap_userguide.doc (rev 1.04l)

Add to Reading List

Source URL: www.smtptrap.com

Language: English - Date: 2009-11-05 07:39:28
328Technology / Data / IEEE 802.1X / Extensible Authentication Protocol / RADIUS / Authenticator / Supplicant / Wired Equivalent Privacy / Wireless access point / Computer network security / Computing / Wireless networking

I N D U S T R Y T R E N D S Will IEEE 802.1X Finally Take Off in 2008? Neal Leavitt

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:45:56
329Network performance / Computer networking / Packet switching / Goodput / Ingress router / Throughput / Router / Transmission Control Protocol / Routing protocols / Computing / Network architecture / Data

Lightweight Source Authentication and Path Validation Tiffany Hyun-Jin Kim Cristina Basescu Limin Jia

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
330Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Transmission Control Protocol / FTPS / Secure communication / Cryptographic protocols / Computing

Fusion Embedded™ SSL Unicoi Systems’ Fusion Secure Socket Layer (SSL) and Transport Layer Security (TLS) provides powerful endpoint authentication, protecting against eavesdropping, message falsification and interfer

Add to Reading List

Source URL: www.unicoi.com

Language: English - Date: 2013-12-06 14:42:57
UPDATE