Authentication protocol

Results: 881



#Item
401Credit counseling / Personal development / Wireless networking / Technology / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

Wesleyan University Employee Assistance Program Program Description Effective January 1, 2014, our Employee Assistance Program provider, The Wellness Corporation, has been acquired by E4 Health, a leading provider of hol

Add to Reading List

Source URL: www.wesleyan.edu

Language: English - Date: 2014-08-15 12:32:07
402Wireless / Computer network security / Universal Mobile Telecommunications System / Internet protocols / Cryptographic protocols / Extensible Authentication Protocol / IEEE 802.1X / Wireless LAN / AKA / Technology / Wireless networking / Computing

Transparent End-User Authentication Across Heterogeneous Wireless Networks Hong Chen Miroslav Živković, Dirk-Jaap Plas

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 10:53:03
403Cryptography / Wireless networking / Cryptographic protocols / Internet protocols / Extensible Authentication Protocol / Kerberos / Wireless security / IEEE 802.11i-2004 / IEEE 802.1X / Computer network security / Computing / Computer security

A Survey of WPA and 802.11i RSN Authentication Protocols Kwang-Hyun Baek, Sean W. Smith, David Kotz Dartmouth College Computer Science∗ Technial Report TR2004-524 November 2004

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-12-23 16:47:09
404Supervisor / Management / Computer network security / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

July Strong EAP-Supervisory.indd

Add to Reading List

Source URL: www.urmc.rochester.edu

Language: English - Date: 2014-07-10 11:28:23
405Motivation / Supervisor / Social psychology / Organizational behavior / Communication / Occupational safety and health / Human resource management / Extensible Authentication Protocol / Workplace violence / Stress / Management / Burnout

Nov Strong EAP-Supervisory.indd

Add to Reading List

Source URL: www.urmc.rochester.edu

Language: English - Date: 2014-11-21 07:42:13
406Internet / Technology / Diameter Credit-Control Application / Diameter / RADIUS / IP Multimedia Subsystem / Oracle Database / Oracle Corporation / Extensible Authentication Protocol / Computing / Internet protocols / Internet standards

Oracle Communications Service Broker Online Mediation Controller Protocol Implementation Conformance Statement

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2014-05-05 01:53:09
407Internet protocols / Internet standards / Cryptography standards / XKMS / X.509 / Delegated Path Discovery / Lightweight Directory Access Protocol / PKCS / Authentication / Cryptography / Cryptographic protocols / Public-key cryptography

7 May 7, 2003 Comments from Denis Pinkas ([removed]) on XKMS Version 2 (April 18, 2003)

Add to Reading List

Source URL: lists.w3.org

Language: English - Date: 2015-01-11 00:16:59
408Information / Communications protocol / Burrows–Abadi–Needham logic / Key-agreement protocol / Authentication protocol / Dolev-Yao model / Protocol / Public-key cryptography / Station-to-Station protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Speci cation in Formal Cryptographic Protocol Analysis Catherine Meadows

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-26 15:14:05
409IEEE 802.1X / Computer security / Cyberwarfare / Wireless networking / Extensible Authentication Protocol / Supplicant / Authenticator / RADIUS / IEEE 802.1 / Computer network security / Computing / IEEE 802

mancalanetworks Technical Briefing making networks manageable mancalanetworks

Add to Reading List

Source URL: www.mancalanetworks.com

Language: English - Date: 2011-09-20 05:46:30
410Information / Challenge-response authentication / Password authentication protocol / Public-key cryptography / Cryptographic nonce / Needham–Schroeder protocol / Otway–Rees protocol / Cryptographic protocols / Cryptography / Data

NRL Release Number[removed]Environmental Requirements for Authentication Protocols Ran Canetti1 and Catherine Meadows2 and Paul Syverson2 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2013-04-29 10:13:46
UPDATE