Authentication protocol

Results: 881



#Item
31Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
32Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
33Computing / Computer access control / Computer security / Directory services / Federated identity / Internet Standards / Identity management / Lightweight Directory Access Protocol / Shibboleth / Electronic authentication / Authentication / HTTP cookie

PAPI and LDAP Using directories for local authentication and authorization Diego R. López

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
34Human communication / Workplace / Interpersonal communication / Extensible Authentication Protocol / Professional studies

November 2013 Newsletter Five Things You Should Never Say at Work! There are certain statements that are considered toxic in the workplace, according to Barbara

Add to Reading List

Source URL: www.theeap.com

Language: English - Date: 2015-04-20 22:13:08
35Computing / Computer security / Computer access control / Computer network security / Wireless networking / Extensible Authentication Protocol / IEEE 802.1X / RADIUS / Authentication / Mutual authentication / Supplicant / Single sign-on

Secure Authentication System for Public WLAN Roaming Yasuhiko Matsunaga† Ana Sanz Merino † Takashi Suzuki‡

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-03-08 14:47:48
36Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
37Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
38Cryptography / IP / Distance-bounding protocol / Challengeresponse authentication / Computational complexity theory / Interactive proof system

Sound Proof of Proximity of Knowledge Serge Vaudenay ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
39Cryptography / ISO standards / Ubiquitous computing / Computer security / Prevention / Computer access control / Password / Contactless smart card / Challengeresponse authentication / Key-agreement protocol / Smart card / Key

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
40Computing / Network architecture / Cryptographic protocols / Internet protocols / Tunneling protocols / Wireless networking / IPsec / Internet security / Extensible Authentication Protocol / Internet Key Exchange / 6LoWPAN / Virtual private network

Name : Azamuddin Rotation Project Title : Survey on IoT Security Outline : • • •

Add to Reading List

Source URL: www.cs.wustl.edu

Language: English - Date: 2016-01-09 09:36:29
UPDATE