Authentication protocol

Results: 881



#Item
51Access control / Computer access control / Extensible Authentication Protocol / Wireless networking / Identity management / Computer network security / Authentication protocol / Authentication / Near field communication / Protected Extensible Authentication Protocol / IEEE 802.1X

Microsoft Word - Self-Authenticable WD_final.docx

Add to Reading List

Source URL: www.ciee.org.tw

Language: English - Date: 2015-07-30 06:16:01
52Directory services / Computer access control / Internet Standards / Java platform / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / OpenLDAP / PERMIS / Authentication / LDAP Data Interchange Format

Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization

Add to Reading List

Source URL: ics-web.sns.ornl.gov

Language: English - Date: 2011-08-17 15:52:16
53Internet Standards / Internet protocols / Short Message Service / Text messaging / Transmission Control Protocol / Cryptographic protocols / Network protocols / Simple Authentication and Security Layer

Apache Avro# 1.8.1 SASL Profile Table of contents 1 Introduction........................................................................................................................2

Add to Reading List

Source URL: avro.apache.org

Language: English - Date: 2016-05-21 18:02:26
54Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
55Internet protocols / Internet Standards / Directory services / RADIUS / Operating system / Password Authentication Protocol / Web server / NetIQ eDirectory

For Windows, Linux, Solaris & FreeBSD VersionAdministrative & Support Office P.O. BOX 1170

Add to Reading List

Source URL: www.iea-software.com

Language: English - Date: 2012-01-09 00:06:05
56Computer networking / Hop / Ingress router / Packet switching / Router / Transmission Control Protocol / Communications protocol / Firewall / NetFlow / Forwarding plane

Lightweight Source Authentication and Path Validation Tiffany Hyun-Jin Kim Cristina Basescu Limin Jia

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
57Ajax / Software architecture / Computer access control / Application programming interface / Technical communication / JSON / Web API / Authentication / File Transfer Protocol

API Documentation Version: IDnow GmbH – www.idnow.de

Add to Reading List

Source URL: www.idnow.eu

Language: English - Date: 2016-04-07 09:53:48
58Computer network security / Directory services / Computer access control / Lightweight Directory Access Protocol / Kerberos / Authentication / Key distribution center

AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-10-17 03:55:39
59Routing / Internet Standards / Internet protocols / IP addresses / Internet Routing Registry / Routing Policy Specification Language / Border Gateway Protocol / Classless Inter-Domain Routing / Autonomous system / Authentication / WHOIS / Router

Network Working Group Request for Comments: 2725 Category: Standards Track C. Villamizar Avici

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:35:48
60Computer access control / Computer network security / Statistical classification / Support vector machine / Password / Cryptographic nonce / Private biometrics / Authentication protocol / Challengeresponse authentication / Authentication / Biometrics / Man-in-the-middle attack

Secure remote matching with privacy: Scrambled Support Vector Vaulted Verification (S 2 V 3 ) Michael J. Wilber and Terrance E. Boult Vision and Security Technology Lab, UCCS Colorado Springs, CO, 80918, USA {mwilber,tbo

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-02-11 13:31:30
UPDATE