Authentication protocol

Results: 881



#Item
471Computer network security / Wireless networking / Occupational safety and health / Communication / Technology / Behavior / Extensible Authentication Protocol / Wireless security / Learning / Skill / Supervisor

Q. Can you recommend a quick conflict resolution strategy that supervisors can use? Is there such a “formula” – an A, B, C approach? Then, if that doesn’t work, we can refer to the EAP. A. There are thousands of

Add to Reading List

Source URL: hr.wa.gov

Language: English - Date: 2015-01-05 14:57:27
472Ubiquitous computing / Wireless / Authentication protocol / Technology / Rapp / Telecommunications engineering / Computing / Automatic identification and data capture / Privacy / Radio-frequency identification

Microsoft Word - Analysis and_Sun.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-21 02:19:02
473Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:52:55
474System software / Lightweight Directory Access Protocol / OpenLDAP / Active Directory / Directory services / Computing / Software

FortiVoice™ Enterprise Phone System LDAP Authentication Configuration Technical Note FortiVoice Enterprise Phone System LDAP Authentication Configuration Technical Note January 6, 2015

Add to Reading List

Source URL: www.fortivoice.com

Language: English - Date: 2015-01-21 14:31:27
475Motivation / Organizational behavior / Supervisor / Social psychology / Communication / Human resource management / Occupational safety and health / Extensible Authentication Protocol / Positive psychology in the workplace / Stress / Management / Burnout

November[removed]EAP Consultants, LLC[removed]

Add to Reading List

Source URL: www.usgs.gov

Language: English - Date: 2014-11-12 10:11:47
476Key management / Computer network security / Password authentication protocol / Integrated Windows Authentication / Authentication / Revocation list / Digital signature / Parity of a permutation / Cryptography / Public-key cryptography / Notary

PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication Patrick P. Tsang† , Man Ho Au‡ , Apu Kapadia† , Sean W. Smith† † Department of Computer Science

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2008-09-15 21:11:07
477Wireless / Mobile technology / Wireless networking / Internet Protocol / Videotelephony / System Architecture Evolution / Extensible Authentication Protocol / 3GPP / User equipment / Technology / Software-defined radio / Universal Mobile Telecommunications System

TS[removed]V12[removed]Universal Mobile Telecommunications System (UMTS); LTE; 3GPP system to Wireless Local Area Network (WLAN) interworking; WLAN User Equipment (WLAN UE) to network protocols; Stage 3 (3GPP TS[removed]

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2014-10-03 05:12:17
478Cyberwarfare / Denial-of-service attack / SQL injection / Malware / Man-in-the-middle attack / Penetration test / Computer security / Extensible Authentication Protocol / Password / Computer network security / Computing / Security

Index Note to the Reader:  Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. CO

Add to Reading List

Source URL: media.wiley.com

Language: English - Date: 2014-07-28 07:17:40
479Internet / Email / OSI protocols / Cryptographic protocols / Yahoo! / DomainKeys Identified Mail / Bitly / Simple Mail Transfer Protocol / MIME / Email authentication / Computing / Spam filtering

Email Authentication Academy Handout: compilation of relevant standards & their normative references https://otalliance.org/resources/authentication/index.html Updated March 4, [removed])

Add to Reading List

Source URL: otalliance.org

Language: English - Date: 2015-01-15 18:49:49
480Internet standards / Data / Internet / OAuth / Simple Authentication and Security Layer / Datagram Transport Layer Security / Transport Layer Security / Extensible Authentication Protocol / Generic Security Services Application Program Interface / Internet protocols / Cryptographic protocols / Computing

Independent Submission Request for Comments: 7397 Category: Informational ISSN: [removed]J. Gilger

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2014-12-12 19:53:40
UPDATE