Authentication protocol

Results: 881



#Item
571Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: ands.org.au

Language: English - Date: 2011-09-25 21:47:49
572Computer network security / Extensible Authentication Protocol / Employment compensation / Employee benefit / Occupational safety and health

Q. Did the EAP fail to work if performance problems remained after the employee went to the program and cooperated with the EAP? What’s next now that problems remain? A. Not every employee referred to and seen by the

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2014-10-07 13:56:10
573Dolev-Yao model / Secure multi-party computation / Cryptographic primitive / Formal verification / Communications protocol / Transport Layer Security / Authentication protocol / Secure channel / Random oracle / Cryptography / Cryptographic protocols / Universal composability

Report on DIMACS∗ Workshop on Security Analysis of Protocols Date of workshop: June 7 – 9, 2004 Workshop Organizers: John Mitchell, Stanford University Ran Canetti, IBM Watson

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-07-27 15:21:45
574Internet / Email address / MX record / Microsoft Exchange Server / Message transfer agent / Domain Name System / SMTP Authentication / Anti-spam techniques / Simple Mail Transfer Protocol / Email / Computer-mediated communication / Computing

SecurityGateway for Email Servers Installation Guide Step 1 - Install SecurityGateway A.  Download the SecurityGateway installer file from www.altn.com. Select Downloads | SecurityGateway for Email Servers. Click Downl

Add to Reading List

Source URL: static.altn.com

Language: English - Date: 2014-05-22 17:52:29
575Computer security / Internet standards / Code division multiple access / Computer network security / Cryptographic protocols / AAA protocol / RADIUS / OAuth / Kerberos / Computing / Internet protocols / Internet

Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2014-03-02 06:27:58
576Computer network security / Data security / Software testing / National security / National Archives and Records Administration / Vulnerability / Password / Lightweight Directory Access Protocol / Authentication / Security / Computer security / Cyberwarfare

National Archives and Records Administration 8601 Adelphi Road College Park, Maryland[removed]Date September 4,2008

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2009-04-30 14:13:58
577Computer network security / Technology / Cryptographic protocols / Internet protocols / Extensible Authentication Protocol / IEEE 802.1X / IEEE 802.11 / Wireless LAN / RADIUS / Wireless networking / Cryptography / Computing

A Solution for Wireless Privacy and Payments based on E-cash A. Karygiannis∗ Aggelos Kiayias1† Abstract

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
578Wireless networking / Organizational behavior / Computer network security / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Supervisor / Management / Occupational safety and health

July[removed]EAP Consultants, LLC[removed]

Add to Reading List

Source URL: www.usgs.gov

Language: English - Date: 2014-07-02 14:15:30
579Computing / Technology / Electronic engineering / Lantronix / Wireless security / IEEE 802.11 / Protected Extensible Authentication Protocol / IEEE 802.1X / Wireless access point / Computer network security / Wireless networking / Wi-Fi

PremierWave EN Embedded Linux Medical Wireless Device Server

Add to Reading List

Source URL: www.lantronix.com

Language: English - Date: 2013-07-11 20:03:01
580System software / Internet protocols / Internet standards / Lightweight Directory Access Protocol / Password / Active Directory / Authentication / Password manager / Comparison of mail servers / Directory services / Computing / Security

Responsible Use of University Computing Resources Policy Document Secure Directory Services Access Policy for User Authentication and Authorization 1.0 Purpose

Add to Reading List

Source URL: www.montclair.edu

Language: English - Date: 2014-08-13 13:50:12
UPDATE