Authentication protocol

Results: 881



#Item
601Information / Man-in-the-middle attack / Interlock protocol / Out-of-band / Communications protocol / Transport Layer Security / Authentication / Streaming media / Computing / Cryptographic protocols / Data

ABSTRACT Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE:

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2010-12-05 17:18:58
602Protected Extensible Authentication Protocol / Computer architecture / Computing / Software / Wireless networking / Windows Vista / Features new to Windows XP / Wireless security / Password / Windows / Wi-Fi

W8_web_Guide - Wireless_May2013

Add to Reading List

Source URL: ials.sas.ac.uk

Language: English - Date: 2013-11-27 10:55:32
603Employment compensation / Work–life balance / Behavior / Supervisor / Motivation / Extensible Authentication Protocol / Wireless security / Occupational safety and health / Management / Employee assistance program

August 2013 „ My employee argues with me in ways that I would not have dreamt of when I was his age 25

Add to Reading List

Source URL: www.hr.uconn.edu

Language: English - Date: 2013-09-09 13:30:47
604Identity / Federated identity / Access control / Internet standards / Security Assertion Markup Language / Shibboleth / Credential / Authentication / Lightweight Directory Access Protocol / Identity management / Security / Computer security

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Add to Reading List

Source URL: infrastructure.tamu.edu

Language: English - Date: 2009-03-13 09:51:21
605Block cipher modes of operation / Finite fields / Message authentication codes / Cryptographic Message Syntax / Key Management Interoperability Protocol / Key management / PKCS / Internet security / Galois/Counter Mode / Cryptography / Cryptographic protocols / Public-key cryptography

Key Management Interoperability Protocol

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2010-04-29 10:56:53
606Wireless networking / Wi-Fi / Computing / Technology / Telecommunications engineering / Wi-Fi Protected Access / Comparison of wireless LAN clients / Computer network security / Wireless security / Protected Extensible Authentication Protocol

UAWiFi for Ubuntu Linux: Connecting Your Computer to UAWiFi Ubuntu Linux  Click on the wireless icon. A list of networks will appear. If it does not, make sure wireless is

Add to Reading List

Source URL: uits.arizona.edu

Language: English - Date: 2012-10-01 12:57:20
607Information technology management / Crime prevention / National security / Internet protocols / Internet standards / Authentication / Simple Network Management Protocol / Computer security / Cryptographic protocol / Security / Computing / Computer network security

Privilege Management Protocols

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-09-14 10:07:22
608Wireless networking / Cryptography / Technology / IEEE 802.11 / Wireless security / EAP-SIM / Extensible Authentication Protocol / Wi-Fi Protected Access / Wireless LAN / Cryptographic protocols / Computer network security / Computing

Report on DIMACS∗ Workshop on Mobile and Wireless Security Date of Workshop: November 3 - 4, 2004

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-05-10 10:32:50
609Stress / Mind / Work–life balance / Skill / Dismissal / Cognitive science / Workplace violence / Protected Extensible Authentication Protocol / Behavior / Burnout / Motivation

November[removed]UCONN Health Center EAP[removed]or[removed] „ I fear taking action to correct performance with some employees because being too determined could lead to dismissal, thereby causing

Add to Reading List

Source URL: www.hr.uconn.edu

Language: English - Date: 2013-11-04 16:02:03
610Data / Information / Videotelephony / IEEE 802.11 / Protected Extensible Authentication Protocol / Extensible Authentication Protocol / Cisco Systems / Cisco Unified Communications Manager / Network security / Computing / Computer network security / Cryptographic protocols

White Paper Cisco DX650 Cisco DX650 Security Overview The Cisco DX650 includes many security options:

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE