Authentication protocol

Results: 881



#Item
591Computing / Telecommunications engineering / Protected Extensible Authentication Protocol / IEEE 802.1X / Wi-Fi / Service set / Wireless LAN / Cryptographic protocols / Extensible Authentication Protocol / Wireless networking / Computer network security / Technology

Microsoft Word - Other Devices.docx

Add to Reading List

Source URL: www.sonoma.edu

Language: English - Date: 2013-02-05 15:53:27
592Wellness / Supervisor / Work–life balance / Burnout / Motivation / Skill / Extensible Authentication Protocol / Workplace violence / Behavior / Management / Mind

June[removed]UConn EAP[removed]or[removed]  What can supervisors do to encourage employees to practice wellness? I

Add to Reading List

Source URL: www.hr.uconn.edu

Language: English - Date: 2013-06-11 15:03:56
593Computing / Wireless / Cryptographic protocols / Wi-Fi / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / IEEE 802.11 / Wireless LAN / Wireless networking / Technology / Computer network security

Privacy-Preserving[removed]Access-Point Discovery Janne Lindqvist∗§ Tuomas Aura‡∗ George Danezis‡ Teemu Koponen† Annu Myllyniemi∗ Jussi Mäki∗ Michael Roe‡ ABSTRACT It is usual for[removed]WLAN clients to

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-09-14 15:06:11
594Computer network security / Computing / Cryptographic protocols / Service set / Wi-Fi Protected Access / Extensible Authentication Protocol / Wireless LAN / Hacking / Wireless access point / Wireless networking / Technology / Wireless

Privacy-Preserving[removed]Access-Point Discovery (full version) Microsoft Research Technical Report MSR-TR[removed]January 2009 Janne Lindqvist Helsinki University of Technology (TKK), Finland

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2011-09-14 15:06:02
595Internet standards / Internet protocols / HTTP / Password / File Transfer Protocol / Basic access authentication / Default / Representational state transfer / Email / Computing / Internet / Data

SiteUptime.com REST API version[removed] Table of contents

Add to Reading List

Source URL: siteuptime.com

Language: English - Date: 2014-08-21 01:28:08
596Thawte / Root certificate / Verisign / Certificate authority / Protected Extensible Authentication Protocol / Public key certificate / Cryptography / Public-key cryptography / Key management

Windows 7 UAWiFi Manual Setup First, open the Network and Sharing Center by clicking on your Wireless Network icon in the bottom right corner of the screen. In the window that comes up, choose “Manage wireless networks

Add to Reading List

Source URL: uits.arizona.edu

Language: English - Date: 2012-08-13 18:56:31
597Computer network security / Wireless Zero Configuration / Wi-Fi / Protected Extensible Authentication Protocol / Windows Vista / Technology / Computer architecture / Wireless security / Features new to Windows XP / Wireless networking / Windows XP / Computing

How to Connect to UAB’s Wireless Networks Sections: Checking Windows XP for Service Pack 3 Configuring Windows XP SP3 to Connect to uabwifi-nac: Part I Configuring Windows Vista to Connect to uabwifi-nac: Part I Config

Add to Reading List

Source URL: www.uab.edu

Language: English - Date: 2013-07-15 14:25:20
598Ubiquitous computing / Wireless / Authentication protocol / Technology / Automatic identification and data capture / Privacy / Radio-frequency identification

hHB: a Harder HB+ Protocol Ka Ahmad Khoureich∗ Abstract In 2005, Juels and Weis proposed HB+ , a perfectly adapted authentication protocol for resource-constrained devices such as RFID tags. The HB+ protocol is based o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 10:33:28
599Protected Extensible Authentication Protocol / Computer network security / Organizational behavior / Workplace violence / Supervisor / Occupational safety and health / Management

July[removed]UCONN EAP[removed]or[removed]  I manage my employees’

Add to Reading List

Source URL: www.hr.uconn.edu

Language: English - Date: 2014-07-30 15:29:10
600Electronic commerce / Embedded systems / Computer network security / Kerberos / Online shopping / Credit card / Interac / Authentication / Automated teller machine / Payment systems / Business / Technology

NetBill Security and Transaction Protocol Benjamin Cox J. D. Tygar Marvin Sirbu

Add to Reading List

Source URL: www.informedia.cs.cmu.edu

Language: English - Date: 1997-04-25 18:15:58
UPDATE