Authentication protocol

Results: 881



#Item
561Internet protocols / Internet standards / Two-factor authentication / Authentication / Smart card / Public key infrastructure / Online Certificate Status Protocol / Password / SCVP / Cryptography / Public-key cryptography / Cryptographic protocols

Smart Card Alliance Comments: Draft FIPS[removed]Usage: Authentication  LaChelle LeVan  Director, Strategic Alliances - Probaris

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-04-21 01:00:00
562Technology / Cryptographic protocols / Computer security / IEEE 802.11 / Wireless security / IEEE 802.1X / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless access point / Computer network security / Wireless networking / Computing

WLAN Security: Simplifying Without Compromising Ruckus Wireless | White Paper Striking a balance between security

Add to Reading List

Source URL: caleidoscopesolutions.com

Language: English - Date: 2014-07-11 11:22:13
563Cryptographic protocols / Computer network security / Wireless networking / Simple public key infrastructure / Extensible Authentication Protocol / IEEE 802.1X / Transport Layer Security / Authorization certificate / Wireless security / Cryptography / Public-key cryptography / Key management

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗ Nicholas C. Goffee, Sung Hoon Kim, Sean Smith, Punch Taylor, Meiyuan Zhao, John Marchesini Department of Computer Science/Dartmouth PKI Lab† Dartmo

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2004-03-24 17:11:37
564Computing / Technology / Electronic engineering / Lantronix / Wireless security / IEEE 802.11 / Protected Extensible Authentication Protocol / IEEE 802.1X / Wireless LAN / Computer network security / Wireless networking / Wi-Fi

PremierWave EN Embedded Linux Wireless Medical Server SystemDevice

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-07-11 20:03:00
565Computing / Wi-Fi / Protected Extensible Authentication Protocol / Technology / Comparison of wireless LAN clients / Features new to Windows XP / Windows XP / Microsoft Windows / Wireless networking

Memorial University of Newfoundland Wireless Connection Installation Manual Windows XP

Add to Reading List

Source URL: www.mi.mun.ca

Language: English - Date: 2014-06-06 12:24:49
566Technology / Wireless / Wi-Fi / Cisco Unified Communications Manager / DBm / Extensible Authentication Protocol / Cisco Systems / Wireless security / IEEE 802.11 / Computer network security / Wireless networking / Computing

Data Sheet Cisco DX80 Product Overview Discover a delightful new approach to working that is simple to use and offers an uncompromised collaboration

Add to Reading List

Source URL: www.cisco.com

Language: English
567Skill / Workplace conflict / Behavior / Communication / Workplace violence / Extensible Authentication Protocol / Management / Occupational safety and health / Learning

Q. I like meetings because they bring people together. I’ve read a lot about making meetings efficient, but we still have problems with getting work done, nonparticipation, and low productivity. What efficiency tips ca

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2014-10-07 13:56:10
568Protected Extensible Authentication Protocol / Social psychology / Communication / Extensible Authentication Protocol / Work–life balance / Burnout / Occupational safety and health

Q. Competition makes around-the-clock communication almost essential. I don’t hear many complaints, but are employees at risk for burnout by being so responsive to customers and work demands? How much pressure can I pu

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2014-10-07 13:56:10
569Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

SP[removed]Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
570Organizational behavior / Wireless networking / Communication / Employment / Protected Extensible Authentication Protocol / Workplace violence / Supervisor / Occupational safety and health / Management

Q. I manage my employees’ performance problems by doing everything I can to help them improve. If that fails, I refer them to the EAP. Sometimes they are willing to attend, and sometimes not. Is this a proper use of th

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2014-10-07 13:56:09
UPDATE