Authentication protocol

Results: 881



#Item
431Videotelephony / Universal Mobile Telecommunications System / Cryptographic protocols / IP Multimedia Subsystem / Multimedia / Session Initiation Protocol / 3GPP / AKA / Digest access authentication / Technology / Electronic engineering / Mobile technology

TS[removed]V12[removed]Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and S

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-02-05 10:14:26
432SCADA / Remote Terminal Unit / Open Systems International / PROMOTIC SCADA system / Telemetry / Technology / Industrial automation

Authentication Issues between entities during protocol message exchange in SCADA Systems Manuel Humberto Santander Peláez [removed]

Add to Reading List

Source URL: manuel.santander.name

Language: English - Date: 2013-07-21 01:32:39
433Post Office Protocol / STARTTLS / Simple Mail Transfer Protocol / SMTP Authentication / Message transfer agent / Webmail / Port / Email / Computer-mediated communication / Computing

Important facts in a nutshell regarding your account Your user name A user name (e.g., "mueller") will be assigned to you when you activate your account. You will need it to access the university network. If you have for

Add to Reading List

Source URL: portal-o.hm.edu

Language: English - Date: 2013-11-24 16:12:22
434Technology / Wireless networking / Computer network security / Electronic engineering / Internet Protocol / Extensible Authentication Protocol / EAP-SIM / Wi-Fi Alliance / IEEE 802.11u / Wi-Fi / Cryptographic protocols / Computing

White Paper Architecture for Mobile Data Offload over Wi-Fi Access Networks Introduction Mobile network traffic is growing exponentially, and service providers must manage their networks efficiently to

Add to Reading List

Source URL: www.cisco.com

Language: English
435Federated identity / Internet standards / Internet protocols / Authorization / Authentication / Identity management / Two-factor authentication / Security token / Lightweight Directory Access Protocol / Security / Computer security / Computing

Microsoft Word - IdentityManagementReference ArchitectureForDesign.doc

Add to Reading List

Source URL: designfest.acm.org

Language: English - Date: 2007-01-15 17:50:22
436Internet Message Access Protocol / Secure Password Authentication / Message transfer agent / Gmail / Email client / Simple Mail Transfer Protocol / Computing / Email / Computer-mediated communication

Outlook 2010 IMAP/POP Configuration for UB E-mail (Faculty & Staff) Note: IMAP accounts can also be added from Start > Control Panel > Mail > E-mail Accounts > New 1. Open Outlook[removed]Click the File tab or the Offic

Add to Reading List

Source URL: www.ubalt.edu

Language: English - Date: 2012-03-05 09:47:57
437Network architecture / Internet standards / Internet protocols / Secure communication / HTTP / TLS-SRP / HTTP Secure / Post Office Protocol / File Transfer Protocol / Cryptographic protocols / Internet / Computing

HTTP Mutual authentication protocol proposal

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2009-03-25 21:32:52
438Ubiquitous computing / Wireless / N1 road / XTR / Technology / Telecommunications engineering / Finite fields / Automatic identification and data capture / Radio-frequency identification

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Wang Shao-hui1,2,3, Han Zhijie1,2, Liu Sujuan1,2, Chen Dan-wei1,2 {1.College of Computer, Nanjing University of Posts and Telecommunications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-09 07:48:21
439Password / Login / Email / Transaction authentication number / GPRS Tunnelling Protocol / Computing / Access control / Security

Microsoft Word - WelcometoGTPwcodeboxsample2014.doc

Add to Reading List

Source URL: www.arcticintl.com

Language: English - Date: 2015-01-30 14:22:08
440Computer network security / Wireless networking / Occupational safety and health / Communication / Technology / Behavior / Extensible Authentication Protocol / Wireless security / Learning / Skill / Supervisor

Q. Can you recommend a quick conflict resolution strategy that supervisors can use? Is there such a “formula” – an A, B, C approach? Then, if that doesn’t work, we can refer to the EAP. A. There are thousands of

Add to Reading List

Source URL: www.cwu.edu

Language: English - Date: 2014-12-03 18:51:25
UPDATE